Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_262.exe

Overview

General Information

Sample name:LisectAVT_2403002A_262.exe
Analysis ID:1481019
MD5:6efb242ee7f7a8fac1e25dec0ac7f516
SHA1:65f5091253ff71b5fe2c5539413034dfdded3bdf
SHA256:7cb0ebf40882b541a0afbe9e0c1fa73f78df98778d745e821d4abb209df37966
Tags:exe
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected RisePro Stealer
AI detected suspicious sample
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found potential dummy code loops (likely to delay analysis)
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
PE file contains section with special chars
Potential thread-based time evasion detected
Switches to a custom stack to bypass stack traces
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LisectAVT_2403002A_262.exe (PID: 3300 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_262.exe" MD5: 6EFB242EE7F7A8FAC1E25DEC0AC7F516)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: LisectAVT_2403002A_262.exe PID: 3300JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    No Sigma rule has matched
    No Snort rule has matched
    Timestamp:2024-07-25T03:00:23.355182+0200
    SID:2046269
    Source Port:49730
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T03:00:38.371393+0200
    SID:2022930
    Source Port:443
    Destination Port:49731
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T03:00:20.371409+0200
    SID:2049060
    Source Port:49730
    Destination Port:50500
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-07-25T03:01:16.344989+0200
    SID:2022930
    Source Port:443
    Destination Port:49737
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: LisectAVT_2403002A_262.exeAvira: detected
    Source: LisectAVT_2403002A_262.exeReversingLabs: Detection: 55%
    Source: LisectAVT_2403002A_262.exeVirustotal: Detection: 60%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: LisectAVT_2403002A_262.exeJoe Sandbox ML: detected
    Source: LisectAVT_2403002A_262.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 193.233.132.190:50500
    Source: Joe Sandbox ViewIP Address: 193.233.132.190 193.233.132.190
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.190
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.190
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.190
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.190
    Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.190
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002CE0A0 recv,setsockopt,setsockopt,connect,setsockopt,0_2_002CE0A0
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT

    System Summary

    barindex
    Source: LisectAVT_2403002A_262.exeStatic PE information: section name: .vmp$PH
    Source: LisectAVT_2403002A_262.exeStatic PE information: section name: .vmp$PH
    Source: LisectAVT_2403002A_262.exeStatic PE information: section name: .vmp$PH
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003340A00_2_003340A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0033E0F00_2_0033E0F0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002BE1500_2_002BE150
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003062700_2_00306270
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003AE2640_2_003AE264
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003A83140_2_003A8314
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0033E3000_2_0033E300
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0037E3000_2_0037E300
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003383700_2_00338370
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003B04130_2_003B0413
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002DC4700_2_002DC470
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003244500_2_00324450
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002B24F00_2_002B24F0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003104D00_2_003104D0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0037C5800_2_0037C580
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003666300_2_00366630
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003346100_2_00334610
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0039A65D0_2_0039A65D
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0036C7700_2_0036C770
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0049885E0_2_0049885E
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0033A8400_2_0033A840
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002D88A00_2_002D88A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002FA9000_2_002FA900
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0039A99F0_2_0039A99F
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_00332A700_2_00332A70
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002DEA600_2_002DEA60
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_00370A900_2_00370A90
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002D4AD00_2_002D4AD0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0033CC300_2_0033CC30
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002DAE300_2_002DAE30
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_00344EE00_2_00344EE0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_00394F580_2_00394F58
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_00396F900_2_00396F90
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0033CF800_2_0033CF80
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0034B0000_2_0034B000
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003350400_2_00335040
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0033F1100_2_0033F110
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003411100_2_00341110
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003371000_2_00337100
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002F31600_2_002F3160
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002E11D00_2_002E11D0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002FF2800_2_002FF280
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002D33300_2_002D3330
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003453D00_2_003453D0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0046B4500_2_0046B450
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0033D4000_2_0033D400
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003854700_2_00385470
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003814500_2_00381450
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002EB4800_2_002EB480
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003356F00_2_003356F0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003417F00_2_003417F0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002E77E00_2_002E77E0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002E58A00_2_002E58A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0038B9000_2_0038B900
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: String function: 0038E9C0 appears 34 times
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: String function: 00340F50 appears 87 times
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: String function: 002B2AE0 appears 58 times
    Source: LisectAVT_2403002A_262.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@0/1
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeFile created: C:\Users\user\AppData\Local\Temp\adobe1UCxyIil7R_yJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: LisectAVT_2403002A_262.exe, LisectAVT_2403002A_262.exe, 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
    Source: LisectAVT_2403002A_262.exeReversingLabs: Detection: 55%
    Source: LisectAVT_2403002A_262.exeVirustotal: Detection: 60%
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSection loaded: devobj.dllJump to behavior
    Source: LisectAVT_2403002A_262.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: LisectAVT_2403002A_262.exeStatic file information: File size 2956293 > 1048576
    Source: LisectAVT_2403002A_262.exeStatic PE information: Raw size of .vmp$PH is bigger than: 0x100000 < 0x2ce800
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002EB480 SHGetFolderPathA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_002EB480
    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp$PH
    Source: LisectAVT_2403002A_262.exeStatic PE information: real checksum: 0x2deb24 should be: 0x2deb29
    Source: LisectAVT_2403002A_262.exeStatic PE information: section name: .vmp$PH
    Source: LisectAVT_2403002A_262.exeStatic PE information: section name: .vmp$PH
    Source: LisectAVT_2403002A_262.exeStatic PE information: section name: .vmp$PH
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0042A0AB push ss; iretd 0_2_0042A0EA
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_004C2120 pushad ; iretd 0_2_004C2191
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0038E588 push ecx; ret 0_2_0038E59B
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0041E97D push 7396A22Dh; iretd 0_2_0041E999
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_004DA980 push ebx; retf 0_2_004F2F2A
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_004DCA60 push ebx; retf 0_2_004DCA6A
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_004ECB3C push esp; retf 237Dh0_2_004ECB5F
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_004BF1AD push ecx; ret 0_2_004BF1C9
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_003340A0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_003340A0

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_0-86472
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-86473
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeStalling execution: Execution stalls by calling Sleepgraph_0-86563
    Source: Initial fileSignature Results: Thread-based counter
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI/Special instruction interceptor: Address: 52EEF2
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI/Special instruction interceptor: Address: 51EB62
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI/Special instruction interceptor: Address: 521493
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI/Special instruction interceptor: Address: 5AC5DF
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI/Special instruction interceptor: Address: 563ADB
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI/Special instruction interceptor: Address: 55A082
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI/Special instruction interceptor: Address: 617C84
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_004EA790 rdtsc 0_2_004EA790
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,0_2_00312530
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeWindow / User API: threadDelayed 3118Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeWindow / User API: threadDelayed 5366Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeAPI coverage: 4.7 %
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exe TID: 1220Thread sleep count: 3118 > 30Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exe TID: 1220Thread sleep time: -314918s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exe TID: 3060Thread sleep count: 303 > 30Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exe TID: 1220Thread sleep count: 5366 > 30Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exe TID: 1220Thread sleep time: -541966s >= -30000sJump to behavior
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeLast function: Thread delayed
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105722473.00000000010FC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}J
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}544
    Source: LisectAVT_2403002A_262.exe, 00000000.00000003.1670745035.00000000014D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}t
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_C88909DA
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg
    Source: LisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeProcess Stats: CPU usage > 42% for more than 60s
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_004EA790 rdtsc 0_2_004EA790
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002EB480 SHGetFolderPathA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_002EB480
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_00312530 mov eax, dword ptr fs:[00000030h]0_2_00312530
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_00312530 mov eax, dword ptr fs:[00000030h]0_2_00312530
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002C4100 mov eax, dword ptr fs:[00000030h]0_2_002C4100
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_0038E3B4 cpuid 0_2_0038E3B4
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeCode function: 0_2_002BA480 GetProcAddress,GetVersionExA,0_2_002BA480
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_262.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_262.exe PID: 3300, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_262.exe PID: 3300, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    211
    Virtualization/Sandbox Evasion
    OS Credential Dumping421
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Deobfuscate/Decode Files or Information
    LSASS Memory211
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS224
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    LisectAVT_2403002A_262.exe55%ReversingLabsWin32.Trojan.Leonem
    LisectAVT_2403002A_262.exe61%VirustotalBrowse
    LisectAVT_2403002A_262.exe100%AviraTR/AVI.ClipBankercoin.sphdl
    LisectAVT_2403002A_262.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.winimage.com/zLibDll0%URL Reputationsafe
    http://www.winimage.com/zLibDll0%URL Reputationsafe
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT0%Avira URL Cloudsafe
    https://t.me/RiseProSUPPORT0%VirustotalBrowse
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%VirustotalBrowse
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllLisectAVT_2403002A_262.exe, 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.winimage.com/zLibDllLisectAVT_2403002A_262.exe, 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    https://t.me/RiseProSUPPORTLisectAVT_2403002A_262.exe, 00000000.00000002.4105801737.00000000014AE000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    193.233.132.190
    unknownRussian Federation
    2895FREE-NET-ASFREEnetEUfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1481019
    Start date and time:2024-07-25 02:59:29 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:LisectAVT_2403002A_262.exe
    Detection:MAL
    Classification:mal100.troj.evad.winEXE@1/0@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    21:00:52API Interceptor1284779x Sleep call for process: LisectAVT_2403002A_262.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    193.233.132.190file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
      file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
        file.exeGet hashmaliciousClipboard Hijacker, PrivateLoader, RisePro StealerBrowse
          file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
            file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
              file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                  file.exeGet hashmaliciousRisePro StealerBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    FREE-NET-ASFREEnetEULisectAVT_2403002A_224.exeGet hashmaliciousRisePro StealerBrowse
                    • 193.233.132.74
                    hunta[1].exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                    • 193.233.132.62
                    External Own 4.20.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                    • 147.45.47.64
                    Aquantia_Setup 2.11.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                    • 147.45.47.64
                    AdobeUpdaterV131.exeGet hashmaliciousBdaejec, RisePro StealerBrowse
                    • 193.233.132.62
                    installer.exeGet hashmaliciousLummaC, PureLog Stealer, Xmrig, zgRATBrowse
                    • 147.45.47.81
                    92.249.48.47-skid.arm7-2024-07-20T09_04_19.elfGet hashmaliciousMirai, MoobotBrowse
                    • 147.45.93.156
                    conhost.exeGet hashmaliciousXmrigBrowse
                    • 147.45.47.81
                    http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
                    • 147.45.78.74
                    Software1.30.1.exeGet hashmaliciousRedLine, XmrigBrowse
                    • 147.45.47.81
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.9567746793562995
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:LisectAVT_2403002A_262.exe
                    File size:2'956'293 bytes
                    MD5:6efb242ee7f7a8fac1e25dec0ac7f516
                    SHA1:65f5091253ff71b5fe2c5539413034dfdded3bdf
                    SHA256:7cb0ebf40882b541a0afbe9e0c1fa73f78df98778d745e821d4abb209df37966
                    SHA512:c4c45accca846279eb8bd0bd6cca89bdaea9a2eb144a62d1a40ee81123c7b4ba5f6a368f512d6f1246c559e3d4ff77d32eefbe3cad85fb6f850b2be239386bab
                    SSDEEP:49152:daMLcLQK2pQxjS8p8/wXkT34LDMHcVKLu4Ncn/TC12oaho0U3sFOM+Hi9OiQHZZ8:3G2afwOaoLDMH8KK4NcCaysh+HiYi4Zn
                    TLSH:5AD52344AAD71159D58957340B03FFBC31B23EA54BA48D59B7B8BACAE8F725421F3203
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...fS.e..............."..............6...........@...........................R.....$.-...@.........................4.1.J..
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x76feb1
                    Entrypoint Section:.vmp$PH
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x65FC5366 [Thu Mar 21 15:33:58 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:410a0b262f1c4d9a86c700f5864e57ee
                    Instruction
                    push esi
                    mov esi, 888DEE22h
                    not si
                    push esi
                    pushfd
                    sub byte ptr [esp+esi+7772EE27h], FFFFFF9Ch
                    xor word ptr [esp+esi+7772EE27h], si
                    mov esi, dword ptr [esp+esi+7772EE2Bh]
                    mov dword ptr [esp+08h], 856776FFh
                    push dword ptr [esp+00h]
                    popfd
                    lea esp, dword ptr [esp+08h]
                    call 00007F2DA47B1CC4h
                    push 5FBFE51Dh
                    call 00007F2DA473C4AAh
                    push ebx
                    bt eax, eax
                    imul bp, bp
                    mov ebp, edi
                    movzx ebx, al
                    ror bl, FFFFFFE6h
                    add bl, bh
                    mov ebx, edx
                    movsx edx, ax
                    dec eax
                    mov edx, ebx
                    sal edx, 02h
                    mov eax, ebp
                    call 00007F2DA47C097Ah
                    mov edx, 323C68A9h
                    btc edx, edx
                    movzx eax, dl
                    mov al, byte ptr [eax+edi-000000A9h]
                    adc dl, FFFFFFBDh
                    adc edx, 8BB804A6h
                    add dl, dh
                    adc edi, 00000001h
                    jmp 00007F2DA46C83CBh
                    and dl, al
                    not dl
                    jmp 00007F2DA4790CDCh
                    mov dword ptr [edi], ecx
                    jmp 00007F2DA46B9062h
                    push 7B3B273Dh
                    sbb edi, 00000008h
                    call 00007F2DA4966A9Eh
                    mov si, word ptr [edi]
                    mov ecx, 6F18162Ah
                    mov ax, word ptr [edi+ecx-6F181628h]
                    sal cx, FFC8h
                    adc cl, byte ptr [edi+ecx+00E7D604h]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x3116340x4a.vmp$PH
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x342f140x12c.vmp$PH
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5230000x8940.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5210000x1a50.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5202e00x40.vmp$PH
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x2510000x84.vmp$PH
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x10bbe80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x10d0000x23b780x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x1310000x48c00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .vmp$PH0x1360000x11aec90x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .vmp$PH0x2510000x5600x6000221fb5e4225cc340ee4e43c8a9cb136False0.06770833333333333data0.40873607633360837IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .vmp$PH0x2520000x2ce7000x2ce8004492772c4a9fb270cce5fba8cc9cd4f3unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .reloc0x5210000x1a500x1c007f8eddde7fe19b79a3dbaa85406a4958False0.37723214285714285data5.789048687758576IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x5230000x89400xe00e14a07ab56bcb473b6e032789458bd8bFalse0.32254464285714285data3.5602061214740988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    AFX_DIALOG_LAYOUT0x523d080x2data5.0
                    AFX_DIALOG_LAYOUT0x523d0c0x2data5.0
                    RT_DIALOG0x523d100x8edata0.08450704225352113
                    RT_DIALOG0x523da00x1eadata0.125
                    RT_DIALOG0x523f8c0x1bcempty0
                    RT_STRING0x5241480x44cempty0
                    RT_STRING0x5245940x422empty0
                    RT_STRING0x5249b80x45eempty0
                    RT_STRING0x524e180x426empty0
                    RT_STRING0x5252400x3c2empty0
                    RT_STRING0x5256040x2d6empty0
                    RT_STRING0x5258dc0x62empty0
                    RT_RCDATA0x5259400x6000emptyEnglishUnited States0
                    RT_MESSAGETABLE0x5233a40x74cMatlab v4 mat-file (little endian) T, text, rows 200, columns 225, imaginaryEnglishUnited States0.30085653104925053
                    RT_MANIFEST0x523af00x216ASCII text, with CRLF line terminators0.5411985018726592
                    DLLImport
                    KERNEL32.dllGetVersionExA
                    USER32.dllwsprintfA
                    GDI32.dllCreateCompatibleBitmap
                    ADVAPI32.dllRegCloseKey
                    SHELL32.dllShellExecuteA
                    ole32.dllCoInitialize
                    WS2_32.dllWSAStartup
                    CRYPT32.dllCryptUnprotectData
                    SHLWAPI.dllPathFindExtensionA
                    gdiplus.dllGdipGetImageEncoders
                    SETUPAPI.dllSetupDiEnumDeviceInfo
                    ntdll.dllRtlUnicodeStringToAnsiString
                    RstrtMgr.DLLRmStartSession
                    KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
                    NameOrdinalAddress
                    Start10x465970
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-25T03:00:23.355182+0200TCP2046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)4973050500192.168.2.4193.233.132.190
                    2024-07-25T03:00:38.371393+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973113.85.23.86192.168.2.4
                    2024-07-25T03:00:20.371409+0200TCP2049060ET MALWARE RisePro TCP Heartbeat Packet4973050500192.168.2.4193.233.132.190
                    2024-07-25T03:01:16.344989+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973720.12.23.50192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 25, 2024 03:00:20.336462975 CEST4973050500192.168.2.4193.233.132.190
                    Jul 25, 2024 03:00:20.341460943 CEST5050049730193.233.132.190192.168.2.4
                    Jul 25, 2024 03:00:20.341548920 CEST4973050500192.168.2.4193.233.132.190
                    Jul 25, 2024 03:00:20.371408939 CEST4973050500192.168.2.4193.233.132.190
                    Jul 25, 2024 03:00:20.376594067 CEST5050049730193.233.132.190192.168.2.4
                    Jul 25, 2024 03:00:23.355181932 CEST4973050500192.168.2.4193.233.132.190
                    Jul 25, 2024 03:00:23.362112999 CEST5050049730193.233.132.190192.168.2.4
                    Jul 25, 2024 03:00:41.776778936 CEST5050049730193.233.132.190192.168.2.4
                    Jul 25, 2024 03:00:41.776973009 CEST4973050500192.168.2.4193.233.132.190

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:21:00:18
                    Start date:24/07/2024
                    Path:C:\Users\user\Desktop\LisectAVT_2403002A_262.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_262.exe"
                    Imagebase:0x7ff7699e0000
                    File size:2'956'293 bytes
                    MD5 hash:6EFB242EE7F7A8FAC1E25DEC0AC7F516
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:0.4%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:10.5%
                      Total number of Nodes:76
                      Total number of Limit Nodes:20
                      execution_graph 86471 312530 GetCursorPos 86472 312545 GetCursorPos 86471->86472 86473 312618 GetPEB 86472->86473 86476 312557 86472->86476 86473->86476 86474 312563 GetPEB 86474->86476 86475 31268d Sleep 86475->86472 86476->86473 86476->86474 86476->86475 86476->86476 86477 3125d8 Sleep GetCursorPos 86476->86477 86478 3126b7 86476->86478 86477->86473 86477->86476 86479 3976d8 86480 3976eb 86479->86480 86483 3975b3 86480->86483 86482 3976f7 86484 3975bf std::_Throw_Cpp_error __FrameHandler3::FrameUnwindToState 86483->86484 86486 3975c9 std::_Throw_Cpp_error 86484->86486 86487 39764a 86484->86487 86486->86482 86488 397657 std::_Throw_Cpp_error 86487->86488 86489 39767a std::_Throw_Cpp_error 86487->86489 86488->86486 86489->86488 86495 3a58dd 86489->86495 86491 39769a std::_Throw_Cpp_error 86499 3a3532 86491->86499 86493 3976ad 86493->86488 86503 3a58a3 GetLastError 86493->86503 86496 3a5906 86495->86496 86497 3a58f4 86495->86497 86496->86491 86497->86496 86504 3a58a3 GetLastError 86497->86504 86500 3a3543 86499->86500 86501 3a355b 86499->86501 86500->86493 86501->86500 86505 3a34a1 86501->86505 86503->86488 86504->86496 86506 3a34ad std::_Throw_Cpp_error __FrameHandler3::FrameUnwindToState 86505->86506 86508 3a34ec std::_Throw_Cpp_error 86506->86508 86509 3a3605 86506->86509 86508->86500 86510 3a3615 std::_Throw_Cpp_error 86509->86510 86511 3a3659 FindCloseChangeNotification 86510->86511 86513 3a361b std::_Throw_Cpp_error 86510->86513 86512 3a3665 GetLastError 86511->86512 86511->86513 86512->86513 86513->86508 86514 2ba2ca 86515 2ba2cd 86514->86515 86518 393e50 86515->86518 86517 2ba2d7 std::ios_base::_Ios_base_dtor 86521 393d8e 86518->86521 86520 393e62 86520->86517 86522 393d9a __FrameHandler3::FrameUnwindToState 86521->86522 86524 393da1 __Getctype 86522->86524 86525 3a5178 86522->86525 86524->86520 86526 3a5184 __FrameHandler3::FrameUnwindToState std::_Lockit::_Lockit 86525->86526 86529 3a521c 86526->86529 86528 3a519f 86528->86524 86532 3a523f std::_Throw_Cpp_error __Getctype 86529->86532 86531 3a5285 std::_Throw_Cpp_error _unexpected 86531->86528 86532->86531 86533 3a58a3 GetLastError 86532->86533 86533->86531 86534 2ba6a9 86535 2ba6ad 86534->86535 86536 2ba6d4 __Mtx_unlock 86534->86536 86535->86536 86537 2ba6bd GetFileAttributesA 86535->86537 86537->86536 86538 2ba6c9 GetLastError 86537->86538 86538->86536 86539 397b00 86540 397b13 86539->86540 86541 397b26 86539->86541 86546 397a27 86541->86546 86543 397b49 std::_Throw_Cpp_error 86545 397bd7 86543->86545 86550 39cc6d 86543->86550 86547 397a38 86546->86547 86549 397a90 86546->86549 86547->86549 86553 39cc2d GetLastError 86547->86553 86549->86543 86554 39cb4c 86550->86554 86552 39cc86 86552->86545 86553->86549 86556 39cb5e std::_Throw_Cpp_error 86554->86556 86555 39cb66 86555->86552 86556->86555 86557 39cb8d GetLastError 86556->86557 86557->86555 86558 2cf1d0 86559 2cf671 86558->86559 86561 2cf1fb 86558->86561 86560 2cf255 setsockopt recv 86562 2cf294 86560->86562 86561->86560 86563 2cf65c Sleep 86561->86563 86563->86559 86563->86561

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 59 312530-312543 GetCursorPos 60 312545-312551 GetCursorPos 59->60 61 312557-31255d 60->61 62 312618-312621 GetPEB 60->62 61->62 64 312563-31256f GetPEB 61->64 63 312624-312638 62->63 65 312689-31268b 63->65 66 31263a-31263f 63->66 67 312570-312584 64->67 65->63 66->65 68 312641-312649 66->68 69 3125d4-3125d6 67->69 70 312586-31258b 67->70 71 312650-312663 68->71 69->67 70->69 72 31258d-312593 70->72 73 312682-312687 71->73 74 312665-312678 71->74 75 312595-3125a8 72->75 73->65 73->71 74->74 76 31267a-312680 74->76 77 3125aa 75->77 78 3125cd-3125d2 75->78 76->73 79 31268d-3126b2 Sleep 76->79 80 3125b0-3125c3 77->80 78->69 78->75 79->60 80->80 81 3125c5-3125cb 80->81 81->78 82 3125d8-31260a Sleep GetCursorPos 81->82 82->62 83 31260c-312612 82->83 83->62 84 3126b7-3126c8 call 2b6bd0 83->84 87 3126ca-3126cc 84->87 88 3126ce 84->88 89 3126d0-3126ed call 2b6bd0 87->89 88->89
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Cursor$Sleep
                      • String ID:
                      • API String ID: 1847515627-0
                      • Opcode ID: ba450522d8b852cce82a6ad40c87fdeeab15800a7dbbd308e5d3770b60103837
                      • Instruction ID: 6751e5902564f7b2ccb9661868063c498c065fd84e0525a5b3fbc86be543c9c7
                      • Opcode Fuzzy Hash: ba450522d8b852cce82a6ad40c87fdeeab15800a7dbbd308e5d3770b60103837
                      • Instruction Fuzzy Hash: D751CD35A002198FCB1ACF58C8D0EEAB7B6FF89704F1A4099D845AB351D731ED95CB80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 251 2ce0a0-2ce102 call 4bb4d1 call 2b6bd0 * 2 258 2ce10e-2ce168 call 409b65 251->258 259 2ce104-2ce108 251->259 263 2ce18e-2ce193 call 4231d2 258->263 264 2ce16a-2ce170 258->264 259->258 260 2ce1b7-2ce1c0 259->260 267 2ce198-2ce19b 263->267 265 2ce175-2ce18c call 4446e0 264->265 265->263 272 2ce19e-2ce1a5 265->272 269 2ce19d 267->269 270 2ce1c1-2ce1cf call 4564fc 267->270 269->272 276 2ce1b1-2ce1b6 call 4235b0 270->276 277 2ce1d1-2ce1d9 270->277 272->265 278 2ce1a7-2ce1b0 call 470481 272->278 276->260 278->276
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 96ff1605327ca316c8b9a043386054d5797c7744aad8e1b5d4ccb2ea62d7317e
                      • Instruction ID: 78d5166d7f77c71d01861de1a8154755338ce21d1759e17a0bb375b9027baf14
                      • Opcode Fuzzy Hash: 96ff1605327ca316c8b9a043386054d5797c7744aad8e1b5d4ccb2ea62d7317e
                      • Instruction Fuzzy Hash: E3310671504301ABDB209F29C805B6BBBF4FF85338F040B1EF9A8922E1D3759C248B92

                      Control-flow Graph

                      APIs
                      • RegQueryValueExA.KERNELBASE(00000000,}PQ[][SpMP^,00000000,00020019,?,00000400,67747E63,80000002,67747E63,00000000,00020119,00000000), ref: 002BB9A9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID: '.8*$6<63$NRMP$_$_$_$ctdr$c~tg$dtSX$e_Y][BX$}PQ[][SpMP^
                      • API String ID: 3660427363-1506859272
                      • Opcode ID: 130e4c59e912ac15ef55f314adccb1dfdfa04fd9361e30f4603eeafc43295483
                      • Instruction ID: e5ce2f195cb22646b1ff76611d031e1b035a63e3f13184e0788822583d8ee9e6
                      • Opcode Fuzzy Hash: 130e4c59e912ac15ef55f314adccb1dfdfa04fd9361e30f4603eeafc43295483
                      • Instruction Fuzzy Hash: 1F81CF70C1428C9EDF15CFA4C855BEEBBF9AF05348F1481ADE449AB242EBB0560ACF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 92 2cf1d0-2cf1f5 93 2cf1fb-2cf207 92->93 94 2cf671-2cf683 92->94 95 2cf210-2cf218 93->95 96 2cf21a-2cf226 95->96 97 2cf255-2cf28f setsockopt recv call 4b7afd 95->97 98 2cf22e-2cf23a 96->98 99 2cf228 96->99 103 2cf294 97->103 101 2cf23c 98->101 102 2cf242-2cf24f call 2ce0a0 98->102 99->98 101->102 102->97 106 2cf65c-2cf66b Sleep 102->106 106->94 106->95
                      APIs
                      • setsockopt.WS2_32(00000260,0000FFFF,00001006,?,00000008), ref: 002CF274
                      • recv.WS2_32(?,00000004,00000002), ref: 002CF28B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: recvsetsockopt
                      • String ID: S>
                      • API String ID: 2397466200-2549845198
                      • Opcode ID: 88d935d4710ae9d49388e7894b0277525267ccda352db4ffc364127f1a6b5e2b
                      • Instruction ID: 624933514917e0dde2326e803b36b5ec84155ce642523443d0ab0a165bb39371
                      • Opcode Fuzzy Hash: 88d935d4710ae9d49388e7894b0277525267ccda352db4ffc364127f1a6b5e2b
                      • Instruction Fuzzy Hash: D52127789446849FEB26DF64EC85FA677BDF704718FA04329E6209B2E0C7B01804CB55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 107 2ba6a9-2ba6ab 108 2ba6ad-2ba6af 107->108 109 2ba6e7 107->109 110 2ba6b2-2ba6b7 108->110 111 2ba6e9-2ba6fd call 38d314 109->111 110->110 113 2ba6b9-2ba6bb 110->113 113->109 115 2ba6bd-2ba6c7 GetFileAttributesA 113->115 116 2ba6c9-2ba6d2 GetLastError 115->116 117 2ba6e3-2ba6e5 115->117 116->117 118 2ba6d4-2ba6d7 116->118 117->111 118->117 119 2ba6d9-2ba6dc 118->119 119->117 120 2ba6de-2ba6e1 119->120 120->109 120->117
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AttributesErrorFileLastMtx_unlock
                      • String ID:
                      • API String ID: 441747541-0
                      • Opcode ID: 4e45bfc3a3c17087ebaf1c9ff800823212b7e38193282472c18d511615fe2595
                      • Instruction ID: 29abd1726ad12eea6f307fffad7cddf50b9ab498b5832c015d9e4089d14acb34
                      • Opcode Fuzzy Hash: 4e45bfc3a3c17087ebaf1c9ff800823212b7e38193282472c18d511615fe2595
                      • Instruction Fuzzy Hash: 3EF02BF15650530A0D391E3868950FC770E86533ECB6C0752D44BCB591D213CCB7CA53

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 121 3a3605-3a3619 call 3a91ce 125 3a361b-3a361d 121->125 126 3a361f-3a3627 121->126 127 3a366d-3a368d call 3a913d 125->127 128 3a3629-3a3630 126->128 129 3a3632-3a3635 126->129 138 3a369f 127->138 139 3a368f-3a369d call 39bcf8 127->139 128->129 131 3a363d-3a3651 call 3a91ce * 2 128->131 132 3a3653-3a3663 call 3a91ce FindCloseChangeNotification 129->132 133 3a3637-3a363b 129->133 131->125 131->132 132->125 144 3a3665-3a366b GetLastError 132->144 133->131 133->132 141 3a36a1-3a36a4 138->141 139->141 144->127
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,003A34EC,00000000,CF830579,003DEFD8,0000000C,003A35A8,003976AD,?), ref: 003A365B
                      • GetLastError.KERNEL32(?,003A34EC,00000000,CF830579,003DEFD8,0000000C,003A35A8,003976AD,?), ref: 003A3665
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ChangeCloseErrorFindLastNotification
                      • String ID:
                      • API String ID: 1687624791-0
                      • Opcode ID: a51f84e6314bb7b32ae0a3d1e3432aac957c5bdfd59ad7f78f8ae800e62ab674
                      • Instruction ID: 65371f456101f4aed7615b4bbf905ec8fb90f5a3bbf49b2adecc7d37f1cac26a
                      • Opcode Fuzzy Hash: a51f84e6314bb7b32ae0a3d1e3432aac957c5bdfd59ad7f78f8ae800e62ab674
                      • Instruction Fuzzy Hash: B61108326091603AD6272334A98AB6E675DCB87B34F26025AF9199F3E2DB70CD414251

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 147 31f050-31f06f 148 31f075-31f088 147->148 149 31f199 call 2b2270 147->149 150 31f0b0-31f0b8 148->150 151 31f08a 148->151 154 31f19e call 2b21d0 149->154 155 31f0c1-31f0c5 150->155 156 31f0ba-31f0bf 150->156 153 31f08c-31f091 151->153 157 31f094-31f095 call 38dd81 153->157 162 31f1a3-31f1a8 call 3932a0 154->162 159 31f0c7 155->159 160 31f0c9-31f0d1 155->160 156->153 165 31f09a-31f09f 157->165 159->160 163 31f0e0-31f0e2 160->163 164 31f0d3-31f0d8 160->164 168 31f0f1 163->168 169 31f0e4-31f0ef call 38dd81 163->169 164->154 167 31f0de 164->167 165->162 172 31f0a5-31f0ae 165->172 167->157 171 31f0f3-31f119 168->171 169->171 175 31f170-31f196 call 38fa60 call 38ffe0 171->175 176 31f11b-31f145 call 38fa60 call 38ffe0 171->176 172->171 185 31f147-31f155 176->185 186 31f159-31f16d call 38e002 176->186 185->162 187 31f157 185->187 187->186
                      APIs
                      • Concurrency::cancel_current_task.LIBCPMT ref: 0031F19E
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Concurrency::cancel_current_task
                      • String ID:
                      • API String ID: 118556049-0
                      • Opcode ID: f172ecc2e940ff007fa3d7d83195642a696be6f15b40698ec908d00291fcb43d
                      • Instruction ID: 00f7845859960e2782846ed831fd8f00ac7d5028b76034047b324753db24543d
                      • Opcode Fuzzy Hash: f172ecc2e940ff007fa3d7d83195642a696be6f15b40698ec908d00291fcb43d
                      • Instruction Fuzzy Hash: 0941B372A002149FCB1AEF68D8806EE7BA5AF4D350F1546B9F809DB342D631DE9487E1
                      APIs
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F31F0
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F324C
                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 002F327D
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F33B8
                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 002F33E7
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F34E6
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F35BD
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F361B
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F3756
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F37E4
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F395B
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F3B09
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F3C91
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F3D3B
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F3EE2
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F3F7A
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F40B7
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F414E
                      • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 002F42D0
                      • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F4365
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: CreateDirectory$CopyFile$FolderPath
                      • String ID: (,&$ :$6$"$",*"$# $#)'1$#)'1$#)'1$#=%;$%%'-$%($%2l)$'7'!$'<$?$'{"/$(( ;$)$/8$,$,$1m$. &.$.6))$0,'+$4.0"$42l)$42l)$45+-$7*($7*($7*($7=3%$90> $9?$:42:$;$;g("$<,+&$<0'=$?$<'$?<$??$??$?c$<$?c$<$@Z]R$@]SE$A[U_$A[U_$CAYG$CAYG$CBT]$CEWR$DI$FEZR$FZEX$FZQE$FZQE$GPXP$GS$G\YY$G\YY$G\YY$H$HaMZ$Je[X$JfJI$JfWH$Jf[X$L$LVHZ$LVHZ$LVHZ$NRXV$N\YZ$N\YZ$N\YZ$P$P$P$P\Hg$P\KQ$P\KQ$P\KQ$QVDV$QX$QXfH$Q\TO$Q^Rc$Qo_[$Qo_[$RI$RJUU$RJUU$RX]K$RX]K$SS$S[WS$S^\U$TP_U$TS$TX$TX$U@XT$UA^R$UGu[$UQ[L$UQ[L$UT[U$UWWD$UWWD$UWWD$UYuX$WDNZ$YPXC$Y_Ng$Y_Ng$Y_Ng$ZPUE$ZPUE$ZPUE$ZTDT$ZV^R$ZV^R$ZV^R$Zcfy$Zcfy$[@XC$[@XC$[@XC$[@XC$[@XC$[X$[X$[X$]J$]J$]J$]K$]KeK$]R$]b]M$^M$^Mfh$_RKQ$_RKQ$`'-1$`i:{$c[JO$dNYC$dgyq$duUX$ebwa$gyse$kSBG$l$l$l$l$lBC_$lBC_$lBC_$lBSE$lE]K$lE^R$lFQK$lPQP$lPQP$lPQP$lPQP$lPQP$lR]]$lR]]$lR]]$lR]]$lR]]$lTKl$lUSG$lUSG$lUSG$l]SF$l]SF$l]SF$la[W$lbFVUX$lbW@$lbW@$lbW@$lbYJDP$lb[T$lb[T$le]G$le]K$le~R$lgb}$lsSG$lsSG$lt^V$lt^VYPXC$lv@\$lv@\$lvS^QF$lvzz$lwWR$lw[_$lw[_$lwfc$lxqb$lxqb$l|W@$l|[P$l|[]$l}G]$l}]P$l}]P$l}]P$l~BV$l~BV$n(,*$qabw$qabw$qabw$qabw$qabw$qabw$qabw$qabw$qabw$qabw$qabw$qabw$qabw$xtfg$z7?9${US^$|xnz$|~qr
                      • API String ID: 3277442881-1190981108
                      • Opcode ID: 6ba2cde1bf5955e28320054635bc47cc62e753c5561f7042043e0f4af55a486d
                      • Instruction ID: 553654bac1febccfa3f9f9cdf2972a0d5a60485d3d0e81ff2a0e106fc8041042
                      • Opcode Fuzzy Hash: 6ba2cde1bf5955e28320054635bc47cc62e753c5561f7042043e0f4af55a486d
                      • Instruction Fuzzy Hash: 7D436DB0C14268DADF25EB60CC56BEEBB74AF14344F4441D8D54977282EB706B98CFA2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: !$!&'$!-.&$"$$,>$$,>8$$.%&$( 24$)$,7$,-'7$,-'7$/3#$$0$2$l)$3$4$7$7$7*($8$@TZT$@\RX$@\rX$@\rX$E$G\YY$G\YY$G\YY$G\YY$G\YY$G\YY$IQJV$L$LVHZ$LVHZ$LVHZ$LVHZ$LVHZ$LVHZ$LizX$N\YZ$N\YZ$N\YZ$N\YZ$N\YZ$N\YZ$OXVW$P@Ek$PQ[K$QGSB$QGSB$QGYk$QMSS$QMSS$QMSS$QMSS$QMSS$QMSS$QW$RRSV$RS[K$T$TXUZ$TaI^$U$U$UVY^$UYCD$U[UR$U[UR$Ua}S$UeMZ$Uunx$V$Vz[H$Vz[H$WADB$WADB$WADB$WADX$WADX$WZ_Y$WZ_Y$WZ_Y$WZ_Y$XPB`$YJ[Y$Y\Uk$ZPNS$ZZ[^$ZZ[^$Z\BR$Z\HO$[VSU$[X$[X$[X$[X$[X$[X$\PDk$\[$]AU_$]KNB$]QRZ$][$][$][UX$_Z$_\$_\fV$`C[^QVY^V$bTVWWZ_Y$dT@A$dXJK$dzUR$ipq\$j2'+$jRS@\$lFS_$lFS_$lPBC$lPF\$lR]^$lS[G$l\G_$lbW@$lbW@$lbW@$lbW@$lbW@$lbW@$lbW@$lfS@$lfS_$lp@^$lp@^$lpF\$lr]Z$lr]Z$ls[G$ls[G$ls[]$ls[]$ltF[$ltF[$ltJ\$ltJ\$lt^V$lt^V$lt^V$lt^V$lt^V$lt^VWADBUeMZPQ[K3$lvGR$lvGR$lx\W$lx\W$lx\W$lx\W$lx\W$lx\W$lx\WQMSS|{$lx\WQMSS|{$l{SK$l{SK$l{SK$l|G_$l|G_$l|]]$l|]]$l}]P$l}]P$l}]P$l}]P$l}]P$l}]P$oIQM$q_]]$rXFP$rscp$tPA[$tPWW$tVYZ$t^UV$vCS]$vCWZ$v]]A$wZDR$wZ_Y$w^^W$y$yIQ\][$y_TZ$y~q\$|TVT$|XFVWZ_Y$|{$|{$|{$|{$|{$|{$}TURWZ_Y$}X\P$~P_V
                      • API String ID: 0-3089971460
                      • Opcode ID: 26f9fc2656e045de9eb4b6c10c704a7de9bb3d3de6893b0d95b4e8f21c57813e
                      • Instruction ID: 226c377fdd492a6701f35ecb788da7c8989ee9807c7a63703f21e159c35f5584
                      • Opcode Fuzzy Hash: 26f9fc2656e045de9eb4b6c10c704a7de9bb3d3de6893b0d95b4e8f21c57813e
                      • Instruction Fuzzy Hash: 1FD255B0D202099FDF19DFB8CC857EDBB79AF05344F24826CE416AB282D770AA55CB51
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4$!$!$!$!$!5#$!5#$!5#$!5#$!5#$%$%1'$)$)$)$)+&.$)50*$*672$,%3%$-$-$/61&$/61&$0$$0$$0/+1$1$1<48$2 4&$3$0c$3$0c$3$0c$3$0c$4 $4 $4 $4 $4$>6$7 4g$72'1$9$<($<=#%$?:/9$@[_\$@]YY$@wDX$BD^VkF_M]fQY$BD^VkS_[]J$BD^VkVY[T\YOcO[\5315$BPeX$CZXk$DAYc$Er]IyPR^Y$F$FZAD$FZEX$HSWT$IMb|$JVMH$KN[M$K\Hg$K\Hg$M]ST$N$ND$NRIL$NXYB$NXb}$N\Pc$NxSS$OJ_I$OXLc$PPNk$PRNR$PZBk$P\CZ$QAWk$QO[X$QXbj$QXfn$QYYY$Q[BD$QakL$SJMZ$SO_K$SSbj$SSbj$SYSk$SZjb$UX$UYR^$UY_Y$UeoH$VTYk$VZNu$WNI^$WZDS$W]jb$W_NL$W_NL$WeoH$XPeC$XZ[c$YE|M$YObj$YPXC$Y~HT$Z$ZicD$[MtE$[QYk$[QYk$[XTZ$[XYS$[X_B$\GYZ$\XWQUZ$\\L^$]ACZ$]K$]M$]O[c$]eoH$^MMZ$^Mf~$^eoH$`hMZ$`hMZ$`~VM$`~VM$aXT_$axsy$cAGG$cEWRY$d^@P\$djJN$dlI^$dlI^$dlI^$dlI^$dxNT$eCS]$fXDR$fedx$g@DQ$h+?$h+?$h}{o$iN[M$iP\WQM$kM[I$kSY[$l/;$lDq\$lU[@$lU[@WZDS$lU[@WZDS$l][V$l`{c$lbBF$lbFV$ld@R$le]A$lg[E$lhS]$lp_Z$lr@J$lrSG$lrW]$lrZA$lrZA$lrZV$lr]P$lr]\$lr]^$lr]^$ls@R$lsSG$ltBZ$lt^V$lu[@WZDS$lv]\$lv]\$lwW]$lx@Z$lz]^$l|SC$l|SK$l|SZ$l|[P$l~@Q$l~BV$l~BV$mJ_I$mJ_I$mJ_I$mJ_I$oQ[V$ptbv$qE]^$qWYg$q\[T[$rPFG$sT\G$sXFA]Z$sY@\$sY@\YP$sY@\YPf[MJ$sY@\YZRX$sY@\Y\CZ$sY@\Y\CZnP_LYO$sYWW[A$s^Qp[V$s^]D[[$s^_\PZ$tCST[[$tXAP$tXAP[GRgl{$tXAP[GRs]O_WSMSZ.5$tXAP[GRtYW[IE$type must be boolean, but is $uA[P$u]W^$vGY@$vGY@$wZUk$x\J^$yC[W$z$zKUL${QHT${VHK${VUL${^_V@T$|K[\$}PJG$~OQH$~TFQ$~XQ[FZ[R$~g{w}t
                      • API String ID: 0-1591587137
                      • Opcode ID: effeaf0b3dfb10e5ea6de5aec3209b5af119ca5e118118c09e67a6a2ac542f94
                      • Instruction ID: f71dfcd77c0aea7003357749eab3676d02fe37ae5fa79cda9da4132fe37444cc
                      • Opcode Fuzzy Hash: effeaf0b3dfb10e5ea6de5aec3209b5af119ca5e118118c09e67a6a2ac542f94
                      • Instruction Fuzzy Hash: C163A8B0810269CACF25EFA8CC157EEBBB5AF05344F5442C9D4593B282D7711B99CFA2
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 002E595D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: *$+"$/?7?$5&% $7+>w$:%J-$;$>"#O$@C]U$@C]U]YS$@PA@$@PA@CZDS$BS$CZDS$EC^$GS$GS$GS$GS$HN$LI[[$QMoi$QMoi$QMoi$RJUU$R\ZR$ST@G$ST@G$U$U_QAMEBR\lI^NS_R%$VZHB$V^@^$V^@^$V^@^$X^AG$Z$Z$Z$Z$Z$Z$Z$ZACZ$ZF$ZF$ZF$ZF$ZT[R$[TK$\$\^UZ$\^UZ$\^UZ$\^UZ$\^UZ$\^UZ$\^UZZ$`C]U$`PF[$cannot use operator[] with a string argument with $ct~v$di/%$g@TZ$g@TZ$g@TZ$gz_I$l$lA@\$lRWA$lRWA$lRWA$lRWA$lRWA$lRWA$lZWJ$lZWJ$lZWJ$lZWJ$lZWJ$lZWJ$l]]T$l`GR$o$p$p$p$|;1-
                      • API String ID: 1514166925-422776455
                      • Opcode ID: d41f9075fe7889401a0f1e1959490d1ac2fa437d7fb685020ec57927822bbc1f
                      • Instruction ID: 0c8f29f486046a716e0c59ab3a1d53bbc5c9da4a04187879ad11f3abaec4365f
                      • Opcode Fuzzy Hash: d41f9075fe7889401a0f1e1959490d1ac2fa437d7fb685020ec57927822bbc1f
                      • Instruction Fuzzy Hash: 6E03C070D142588BDF2ADF64CC99BEDBBB4AF15304F4441D8E409AB282EB745B89CF51
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,00000000), ref: 002D8971
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: $9~s$''&2$,127$1$1$9q~:$=&$$=:/)$@PF[$CTQFFP$E$E$F$F$FLFC$FLFC$FLFC$FP^F$FP^FQ$MEBR$MEBR$P$Q$S^]X$T^_R][$UIBZFTB^WW~ZHX$UYfE$UYfE$U_QA$U_QA$U_QAMEBR\fQ^E$VNQQ$VNQQ$WJNd$XeDR$XeDR$\fQ^$\fQ^$^P_V$_BmP$_BmP$_BmP$_BmPFLFC$`m>.$cannot use operator[] with a string argument with $ct~v$l$l$l$l$l$l$l$l}]P$l}]P$tTTR$tTTRAYB$|^QR
                      • API String ID: 1514166925-2343552700
                      • Opcode ID: 7731e02fb9f52fcb84cb7e6333ea9fd19ce3538b658a6ec8998a3e0e13171d9a
                      • Instruction ID: ff898f33208580367bc9803622949104f29c6ca86198aad8f2e573b7a0db3c1d
                      • Opcode Fuzzy Hash: 7731e02fb9f52fcb84cb7e6333ea9fd19ce3538b658a6ec8998a3e0e13171d9a
                      • Instruction Fuzzy Hash: 1033CE70910258CBDB29DF64C895BEDBBB4AF15300F1441E9E449AB382EB749F98CF91
                      APIs
                        • Part of subcall function 002F3160: CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F31F0
                        • Part of subcall function 002F3160: CreateDirectoryA.KERNEL32(00000000,00000000), ref: 002F324C
                        • Part of subcall function 002F3160: SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 002F327D
                      • CreateDirectoryA.KERNEL32(?,00000000,?,la^FS\XD,003E2D14,00000033,la^FS\XD,la^FS\XD), ref: 003105B5
                      • GetFileAttributesA.KERNEL32(00000000,?,-00000034,0000004C,?,0000004C), ref: 003107AF
                      • GetLastError.KERNEL32(?,-00000034,0000004C,?,0000004C), ref: 003107BA
                      • __Mtx_unlock.LIBCPMT ref: 003107D9
                      • __Mtx_unlock.LIBCPMT ref: 003107E8
                      • CreateDirectoryA.KERNEL32(?,00000000,?,0000004C), ref: 003107FF
                      • GetFileAttributesA.KERNEL32(00000000,?,?,?,-00000034,0000004C,?,0000004C), ref: 003109E0
                      • GetLastError.KERNEL32(?,?,-00000034,0000004C,?,0000004C), ref: 003109EB
                      • __Mtx_unlock.LIBCPMT ref: 00310A0A
                      • __Mtx_unlock.LIBCPMT ref: 00310A1F
                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 00310A3C
                      • GetFileAttributesA.KERNEL32(?,?,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 00310C1C
                      • GetLastError.KERNEL32(?,?,?,?,-00000034,0000004C,?,0000004C), ref: 00310C27
                      • __Mtx_unlock.LIBCPMT ref: 00310C46
                      • __Mtx_unlock.LIBCPMT ref: 00310C55
                      • CreateDirectoryA.KERNEL32(?,00000000,?,?,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 00310C72
                      • GetFileAttributesA.KERNEL32(00000000,|^QRS\XD,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 00310F2C
                      • GetLastError.KERNEL32(?,?,?,?,-00000034,0000004C,?,0000004C), ref: 00310F37
                      • __Mtx_unlock.LIBCPMT ref: 00310F56
                      • __Mtx_unlock.LIBCPMT ref: 00310F65
                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,|^QRS\XD,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 00310F7C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Mtx_unlock$CreateDirectory$AttributesErrorFileLast$FolderPath
                      • String ID: QPXD$\$\$\$\$cH\P$lBQA$la^FS\XD$y_VVLPRsz
                      • API String ID: 2196497886-1339855362
                      • Opcode ID: 81b1a2e21b7c6d3a6a10b70d602ece31968e73971670202e96c918b5d608e24d
                      • Instruction ID: 41d8d3d104a45bd8ed7cfda43ea1f4b798f8e5358f35370127e6d245a7161f99
                      • Opcode Fuzzy Hash: 81b1a2e21b7c6d3a6a10b70d602ece31968e73971670202e96c918b5d608e24d
                      • Instruction Fuzzy Hash: 140305709102588FDF1EDF68CC85BEDBBB5AF09304F148298E549AB282D7719AC5CF61
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,00000000), ref: 002DC54A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: %/!1$'( o$9/(6$=52"$A$CT@E$D^YVZ\$E$E$F$F$FLFC$MEBR$MEBR$UYfE$U_QA$U_QA$U_QAMEBR\fQ^E$VNQQ$WE]X$XeDR$\$\$\$\$\$\$\$\fQ^$\fQ^$]KLR$_BmP$_BmPFLFC$_BmPFLFC$cannot use operator[] with a string argument with $ct~v$l}]P$t!9<$|^QR
                      • API String ID: 1514166925-3444709628
                      • Opcode ID: 0d41f0e7169bb0692188a24e42a0d28c901f569eff301329e891c887220847b1
                      • Instruction ID: 51f4628c9c812c57de9412c9c55fbe169efd5439fff9cf61752eddbea42028f2
                      • Opcode Fuzzy Hash: 0d41f0e7169bb0692188a24e42a0d28c901f569eff301329e891c887220847b1
                      • Instruction Fuzzy Hash: 0133CE709102598FDF29DF68C885BEDBBB5AF05304F1482DAE449AB382D7709E85CF91
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,00000001,?,?), ref: 002DEAC8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: %-&!$%l';$%l';$,$-+!4$-+!4$0 (4$0 (4$0,( $0,( $@M_U$L\TH$OTQQ$QMSS$QMSS$TOQR$ZQSO$\$\$\$]]^Y$lbK]$lrgafpxc$lrgafpxc$lrgafpxc$lx\W$lx\W$l}]P$tTTR$tTTRAYB$tTTRAYB$|{fX$|{fX
                      • API String ID: 1514166925-3406950845
                      • Opcode ID: d3eda4c4248a14b1d07182dd11b557c67d0f17b592e2f2e9f24d4485862c0aee
                      • Instruction ID: 3f95cf8892123e5fe9b93df6b051bcaeae8ba2aa6b9ee3fd2cdf357148f0ae10
                      • Opcode Fuzzy Hash: d3eda4c4248a14b1d07182dd11b557c67d0f17b592e2f2e9f24d4485862c0aee
                      • Instruction Fuzzy Hash: 66239A709102588FDB29CF28CD95BEDBBB5AF05304F5482E9E449AB382D7749E85CF60
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: *?[$-%T$Safety level may not be changed inside a transaction$cache_size$case_sensitive_like$cid$collation_list$database_list$default_cache_size$dflt_value$encoding$exclusive$file$freelist_count$glob$index_info$index_list$journal_mode$journal_size_limit$like$locking_mode$max_page_count$memory$name$normal$not a writable directory$notnull$page_count$page_size$schema_version$seq$seqno$synchronous$table_info$temp_store$temp_store_directory$temporary storage cannot be changed from within a transaction$type$unique$unsupported encoding: %s$user_version
                      • API String ID: 0-4012380797
                      • Opcode ID: c0ec4699f593a1a2a1a4150f491d9350890c84277d1d7aefdefc9960683643af
                      • Instruction ID: 87c754fce391c94b22b5af893f476859efa6bc91eb806c068ecc52e2c9ad895f
                      • Opcode Fuzzy Hash: c0ec4699f593a1a2a1a4150f491d9350890c84277d1d7aefdefc9960683643af
                      • Instruction Fuzzy Hash: F653C074A006818FDB26DF28C4A0B6ABBF1BF05304F1AC59DD8999F392D779E905CB50
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: +$ u$/$/6(?$6hMZ$7.0'$:bF\$:bF\$:bF\$@C]U$@C]U$@PA@CZDS$@PA@CZDS$BC$DI$FTQR$FTQR$GBYE$GS$QS$YT_[$\^UZZ$\^UZZ$]YSD$`S>$`S>$`S>$`S>$`S>$f}{,$jk$jqw $l$l$lAS@$lW]K$l\ML$ls@\CFSEK$pt!Y$pt!Y$u|z$~ec4
                      • API String ID: 0-806085981
                      • Opcode ID: d7d476666c5eb3e5db475fe299415b6b37f280466f87ebcee7c5a6a0a498068a
                      • Instruction ID: 68494ae9748d80fc66db2b2b6d088d576ced4bbc3f2e614f9e3b438df6b67940
                      • Opcode Fuzzy Hash: d7d476666c5eb3e5db475fe299415b6b37f280466f87ebcee7c5a6a0a498068a
                      • Instruction Fuzzy Hash: 0EE26170D11258DADF2AEBA0CC56BDDBB78AF15340F4040D9E44A7B282EB745B89CF61
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 002E78F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: $(0#g$,6("g$/$9=?$$BS$FP^FQ$LVHB$QDF\R\Z[$QDF\R\Z[$Q\V_$R\SZ$R\ZR$U$Y]_D$\$\$^P_V$`PF[$cannot use operator[] with a string argument with $ct~v$l !5$lA@\$lW]A$la4"
                      • API String ID: 1514166925-2439004152
                      • Opcode ID: 80cebc557caeb02fa6c8942b0beab231a1173e8826bad49871d183b581220aa2
                      • Instruction ID: 1c856f6fe30479741f7ab748febfed40ce72540707ea134a35c00ef7103d3d5c
                      • Opcode Fuzzy Hash: 80cebc557caeb02fa6c8942b0beab231a1173e8826bad49871d183b581220aa2
                      • Instruction Fuzzy Hash: 28C2C1709102999FDF29CF64CC85BEDBBB5AF05304F5441ECE449AB282DB709A89CF91
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: $%(9?$&$6$.'$6xm6$;$=?2:$=d}/$EBWAZT[R$LXN^$U\SZXEBWAZT[R$U_QAMEBR\fQ^E$U_QAMEBR\fQ^E$U_QAMEBR\fQ^E$WK[\$YaRZ$_BmPFLFC$_BmPFLFC$_BmPFLFC$`23/$`cst$authorization: $cannot use operator[] with a string argument with $g'.$l}]P$r}}qk$t!/'$ts~l$zoqr$|^QR
                      • API String ID: 190572456-4167187317
                      • Opcode ID: 69796042cb0054ce9d9a788d84b9723b50314dd702a3e24f720d17e707f1b9c3
                      • Instruction ID: 59981558b835d709d416d79d0d889f3c328e67e1aca3d6cf562c5a12b961e5de
                      • Opcode Fuzzy Hash: 69796042cb0054ce9d9a788d84b9723b50314dd702a3e24f720d17e707f1b9c3
                      • Instruction Fuzzy Hash: 0F02CEB0D102488FDB09DFA8C8847DDBBB5BF09304F54866DE41AAB782D7349A95CB90
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 002EB596
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: @vZX$K\lZ$R\ZR$U$fPG_$fPG_$fPG_@rSCqM_V$fPG_@rSCqM_V$fPG_@zFRVo[NPI$lA@\
                      • API String ID: 1514166925-621714570
                      • Opcode ID: ae99877fb332657d6bda3fb2d4dc255893c1634862cad2f8c99b22a2c70a0043
                      • Instruction ID: 055fa3182f4fcb886a68c0b8e473a233dbff665d2fda1e5d2a11c42ccbc1844c
                      • Opcode Fuzzy Hash: ae99877fb332657d6bda3fb2d4dc255893c1634862cad2f8c99b22a2c70a0043
                      • Instruction Fuzzy Hash: C9E1F670810288DEDF15CFA4D884BEEBBB8FF05308F5041ADE415AB292D7755A4ACFA4
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,47415858), ref: 002DAF53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: $!$/k$-+6w$.9;-$DX_V$EC^$P7 <$P\MK$XXAG$XXAG[GO$\$\$cannot use operator[] with a string argument with $ct~v$tTTRAYB$|1?,
                      • API String ID: 1514166925-2669237069
                      • Opcode ID: c3e97fb4fa7566481af02d8c802a7052d50b80d127e4f043332bd069fddf0ce9
                      • Instruction ID: 662458325b0d594215dcaa58cd4c219e70bbe9c328660171dc82f860420f6557
                      • Opcode Fuzzy Hash: c3e97fb4fa7566481af02d8c802a7052d50b80d127e4f043332bd069fddf0ce9
                      • Instruction Fuzzy Hash: 79E2CE70910259CFDB29CF68CC957EEBBB5AF05300F24819AE449AB382D7709E95CF90
                      APIs
                      • GetProcAddress.KERNEL32(00000000,gX\{@AFtWWT^_I), ref: 00332BBC
                      • GetProcAddress.KERNEL32(00000000,7B5C5867), ref: 00332C06
                      • GetProcAddress.KERNEL32(00000000,gX\{@AFt), ref: 00332C3E
                      • GetProcAddress.KERNEL32(00000000,gX\{@AFxH\TiYLKZ35), ref: 00332C86
                      • GetProcAddress.KERNEL32(00000000,7B5C5867), ref: 00332CD9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36$gX\{$gX\{@AFf$gX\{@AFxH\TiYLKZ35$gX\{M\HB$gX\{gX\{M\HB$gx|{
                      • API String ID: 190572456-2900703129
                      • Opcode ID: 6ab2d3deaed4c66168ded611bf821fd40adc8dfea265e69fe22006d1c3f5253a
                      • Instruction ID: d0605c5f4a4106939273ca31e909863a75cc6f7ef6ba7a04bf93d44c3eb8cb69
                      • Opcode Fuzzy Hash: 6ab2d3deaed4c66168ded611bf821fd40adc8dfea265e69fe22006d1c3f5253a
                      • Instruction Fuzzy Hash: BAC13CB08142888EDF45CFA9E4857EEBFF4EF19748F60006ED445AB642E7748509CFA9
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,T^E]XZWSgQSHHRLF), ref: 002D4C1C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: $)="k$4 0$$:996$<*$@PF[$T^E]XZWSgQSHHRLF$T^E]XZWSgQSHHRLF$Y[eN$\$\$ct~v$p5=$$tTTRAYB$tTTRAYB
                      • API String ID: 1514166925-2985984096
                      • Opcode ID: 66a8dfe6ae583ebc276ae1c784788a2e4cba205b63ace9a1db8c21e67d0c6be4
                      • Instruction ID: 5d6e1885a6ee5132fa8d60f594faab19df90b27ed61ffdce73b79257ad4a74be
                      • Opcode Fuzzy Hash: 66a8dfe6ae583ebc276ae1c784788a2e4cba205b63ace9a1db8c21e67d0c6be4
                      • Instruction Fuzzy Hash: 7AD2E171D106598FDB29CF68C8847EDBBB5AF04300F14829EE449AB382D7749E95CF90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: UNIQUE$%s %T cannot reference objects in database %s$%s: %s$%s: %s.%s$CREATE%s INDEX %.*s$INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);$alte$conflicting ON CONFLICT clauses specified$index$index %s already exists$name='%q'$no such collation sequence: %s$no such table$rtab$sqlite_$sqlite_autoindex_%s_%d$sqlite_master$table %s has no column named %s$table %s may not be indexed$there is already a table named %s$virtual tables may not be indexed
                      • API String ID: 0-3211406468
                      • Opcode ID: abc543569a7c2bffbaf61cd5403f95dd31c69d5b8f5d36d053f6917b0ff2d275
                      • Instruction ID: ee45a718af6d65872020344e2c881d10efd032a5ca48f59073e591cbcd6510f6
                      • Opcode Fuzzy Hash: abc543569a7c2bffbaf61cd5403f95dd31c69d5b8f5d36d053f6917b0ff2d275
                      • Instruction Fuzzy Hash: 67A2F170A002459FCB26CF29C491BAEBBB1BF45304F19C5A9D855AF35ADB31ED41CBA0
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,QDF\R\Z[), ref: 002D3453
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: &$)<>$$*$"#$FP^FQ$QDF\R\Z[$QDF\R\Z[$\$\$^P_V$cannot use operator[] with a string argument with $ct~v$tTTRAYB
                      • API String ID: 1514166925-449149491
                      • Opcode ID: e73068ed77223fe0619c64f5a0e502511fd55c6d2225b6fbc7ef67ad994a57a9
                      • Instruction ID: 9687d4397c3247f446163676e816528b01f923e5e927c20036c377da5a8605cd
                      • Opcode Fuzzy Hash: e73068ed77223fe0619c64f5a0e502511fd55c6d2225b6fbc7ef67ad994a57a9
                      • Instruction Fuzzy Hash: B4E2EF709102598FDF29DF68CC847EDBBB5AF05300F1482AAE449AB382D7749E95CF91
                      APIs
                      • GetProcAddress.KERNEL32(?,y_FVF[SCwI_U}), ref: 003340EC
                      • GetProcAddress.KERNEL32(?,y_FVF[SCk\NtLIWP.), ref: 0033412E
                      • GetProcAddress.KERNEL32(?,xEFC{ESYj\KNYNJ~), ref: 00334176
                      • GetProcAddress.KERNEL32(?,y_FVF[SC{VTUY^J~), ref: 003341B7
                      • GetProcAddress.KERNEL32(?,y_FVF[SCwI_UiOR~), ref: 003341F8
                      • GetProcAddress.KERNEL32(?,xEFCy_FVF[SC), ref: 00334236
                      • GetProcAddress.KERNEL32(?,56465F79), ref: 0033427E
                      • GetProcAddress.KERNEL32(?,xEFCgPXSj\KNYNJ~), ref: 003342C6
                      • GetProcAddress.KERNEL32(?,y_FVF[SCj\[_zTRZ), ref: 00334307
                      • GetProcAddress.KERNEL32(?,y_FVy_FV), ref: 0033434D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: y_FVF[SCk\NtLIWP.$y_FVF[SCwI_U}$y_FVy_FVy_FV
                      • API String ID: 190572456-2900599294
                      • Opcode ID: 1766fa3103a1b9d97c9a33e1ab20e7b5c1684832ed77bb0d62bcb29ab826f58f
                      • Instruction ID: 0d22d9e192213dc0bb325583a1058b083f739137850446917782cd5215b0ce21
                      • Opcode Fuzzy Hash: 1766fa3103a1b9d97c9a33e1ab20e7b5c1684832ed77bb0d62bcb29ab826f58f
                      • Instruction Fuzzy Hash: 8D817DB091428CDEDF0ACFA5E8846EEBBB9EF05704F51809ED441AA252D774930ACB65
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: $+$+Inf$-Inf$Inf$NaN$gfff
                      • API String ID: 0-2577472133
                      • Opcode ID: 1e306aed04a2d1e207b539f63208edeb9bee5f869e9e66abf48a39413fc1ac35
                      • Instruction ID: bcaa9086dee8bbf664fcffce63630f0d16341d52753cc192eae55d747be86738
                      • Opcode Fuzzy Hash: 1e306aed04a2d1e207b539f63208edeb9bee5f869e9e66abf48a39413fc1ac35
                      • Instruction Fuzzy Hash: F9822571E083818FD7179F28C4D036BBBE4AF86344F99496DE4C59B396E731C9498B82
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: %d values for %d columns$`V>$`V>$`V>$`V>$rows inserted$table %S has %d columns but %d values were supplied$table %S has no column named %s
                      • API String ID: 0-4124804184
                      • Opcode ID: 64a6dbaee8299865bd91384f4b3d1257e438b8b11f7060306af7c0e079d86bde
                      • Instruction ID: 68eece9e748c54065ffe803c828e3cd392082f07f80f69b1ec255b77cc787e0b
                      • Opcode Fuzzy Hash: 64a6dbaee8299865bd91384f4b3d1257e438b8b11f7060306af7c0e079d86bde
                      • Instruction Fuzzy Hash: D81368706047418FD726EF18C090B2ABBE1FF89344F16C95DE9868B356DB75E819CB82
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: 7a536cbf668e579f0c8b8068099bb530cac02d8a6a22646f5d56ac026212fdef
                      • Instruction ID: 91d37af7fc0452a2d351cf2e9439e7ec09119081bb9567e95657aaf2f0c8960a
                      • Opcode Fuzzy Hash: 7a536cbf668e579f0c8b8068099bb530cac02d8a6a22646f5d56ac026212fdef
                      • Instruction Fuzzy Hash: 00D25D71E082288FDB6ACE28CD507EAB7B5FB45309F1545EAD50DE7640EB34AE858F40
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                      • API String ID: 0-1885142750
                      • Opcode ID: 59e8c75fcf703e50e30697f1c567e2058bdb1ac8d779e07411ad244d10c5e8e7
                      • Instruction ID: 17485c5c8d6237785264ac1ef96e6e8dee81d245aacc3b0736248c6286324a2c
                      • Opcode Fuzzy Hash: 59e8c75fcf703e50e30697f1c567e2058bdb1ac8d779e07411ad244d10c5e8e7
                      • Instruction Fuzzy Hash: A5F1F2B1A003059FEB23AF14ECC6B6AB7A9AF00304F1540A9E9059F2D6D7B5ED45CBD1
                      APIs
                      • GetProcAddress.KERNEL32(00000000,bE^tQA`RJJSTR), ref: 002BA500
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: T$bE^tQA`RJJSTR$~EV_
                      • API String ID: 190572456-4159564008
                      • Opcode ID: 67567df312fd0944ae3c58adaf1169d3e1fcfaafc163ac56c7d74a62c15f149a
                      • Instruction ID: 79142cd87d3830a3685f2ff9409143ec8707219c558575c16adbba3bac315fd4
                      • Opcode Fuzzy Hash: 67567df312fd0944ae3c58adaf1169d3e1fcfaafc163ac56c7d74a62c15f149a
                      • Instruction Fuzzy Hash: A421B030C2424CAACF25CFA4D4887EEBBB8EF15348F9040DDD41AA6241E7758759CB57
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: @$@$@$at most %d tables in a join$cannot use index: %s
                      • API String ID: 0-2763088227
                      • Opcode ID: d7b50c91e2e622b4bca5550256db3059f74470d5b922d32e79353e24b5c11479
                      • Instruction ID: ca994ac2acf91049bce09d2d24b5f6c182bfb8eea61a1d09ac5991c953ea82ef
                      • Opcode Fuzzy Hash: d7b50c91e2e622b4bca5550256db3059f74470d5b922d32e79353e24b5c11479
                      • Instruction Fuzzy Hash: 2C62AC706087418FD716EF18C480B2ABBE1FF89314F168AADE8959B391D774EC45CB92
                      Strings
                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0037C865
                      • min, xrefs: 0037DE8D
                      • too many terms in compound SELECT, xrefs: 0037C81F
                      • max, xrefs: 0037DEFE
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: max$min$only a single result allowed for a SELECT that is part of an expression$too many terms in compound SELECT
                      • API String ID: 0-2877691265
                      • Opcode ID: 7c9edde0bd477901fa3f43dd899f49e0cb523a90c645c2876aac621ad42f20af
                      • Instruction ID: d9415f2632d9378a3cda2df9c3ddd79b77090cfe60dd44398656329aa5b712c6
                      • Opcode Fuzzy Hash: 7c9edde0bd477901fa3f43dd899f49e0cb523a90c645c2876aac621ad42f20af
                      • Instruction Fuzzy Hash: 7E2338706047418FD725DF28C090B2ABBF1BF89304F16C95DE99A8B352DB79E945CB82
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 64f3726e9d1158fca0f6afefcf42a3c85b5684936711d7c09b3d045691fbfa27
                      • Instruction ID: 80ae3b4385eb3c8d147bb42c84d2a0ef75a9df6a90556509a0ccd9a60ef2e807
                      • Opcode Fuzzy Hash: 64f3726e9d1158fca0f6afefcf42a3c85b5684936711d7c09b3d045691fbfa27
                      • Instruction Fuzzy Hash: D1023D71E142199BDF15CFA9C8806AEFBF1FF48314F258269E919E7381D731AA41CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: ZV^^$lBVWMECM]STOa}F"$0%+=$l|]\$stbr
                      • API String ID: 0-725108056
                      • Opcode ID: 664c22a8c738689e98dd37ce94d4e1efe0a090f972d067598c09536a01d37f67
                      • Instruction ID: 2247cfd7c18c46d6d72bbe328d51bb79172f265a8149b28477beb580e2df40b5
                      • Opcode Fuzzy Hash: 664c22a8c738689e98dd37ce94d4e1efe0a090f972d067598c09536a01d37f67
                      • Instruction Fuzzy Hash: C35268B091024ACECB48DFB8D5552AEFBF4FF09344F1482ADC449AB642E771964ACBD1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2$C$i
                      • API String ID: 0-2244554577
                      • Opcode ID: eb49a35e5be38a60a5f30af4d1cdf20f355320cce3bb6fc434da0a3848502a38
                      • Instruction ID: 268cd88bba7faf53fc42cdda5a474c11260f6459d90525a367830aa2a4bc0b8d
                      • Opcode Fuzzy Hash: eb49a35e5be38a60a5f30af4d1cdf20f355320cce3bb6fc434da0a3848502a38
                      • Instruction Fuzzy Hash: 6151033140D7829BC71AEF24C80526BBBE1BFD2314F548A5EF5E607292E7398506CB4B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: no such column: %s$rows updated
                      • API String ID: 0-885832449
                      • Opcode ID: 2c7e51625cf3ffaba7e9967950b7520f38be7fde3823375e63ca9e18283a56e0
                      • Instruction ID: 5d049d301154755d55cb595ea0a4bd349591ee8960d2a21b25ddceae368ea7a1
                      • Opcode Fuzzy Hash: 2c7e51625cf3ffaba7e9967950b7520f38be7fde3823375e63ca9e18283a56e0
                      • Instruction Fuzzy Hash: 94C259742047418FD726DF18C090B2ABBF1BF89344F16C99DE99A8B352D779E815CB82
                      APIs
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003413FB
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0034144D
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                      • String ID:
                      • API String ID: 885266447-0
                      • Opcode ID: 27c5b3372338de7d7bfda0c0e8000eb420848edc0633e142b08433a518e8147b
                      • Instruction ID: ee6c69a5a352376a7b8077fd4383e56ea919db2d53ea373fa2f3d55eb31ba85c
                      • Opcode Fuzzy Hash: 27c5b3372338de7d7bfda0c0e8000eb420848edc0633e142b08433a518e8147b
                      • Instruction Fuzzy Hash: 85F10271E006198BCF16CFADC8902EDFBF1FB89310F1A42AAD594EF291D77159808B90
                      APIs
                      • Concurrency::cancel_current_task.LIBCPMT ref: 00324665
                      • Concurrency::cancel_current_task.LIBCPMT ref: 0032485C
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Concurrency::cancel_current_task
                      • String ID:
                      • API String ID: 118556049-0
                      • Opcode ID: 0682d0525f26f26695730ce3270428992653feb2a4615428683965e127f80bed
                      • Instruction ID: 781c17808f5eb265352b6a2d7ae7783a8626490a588b92396c873693aa997ebe
                      • Opcode Fuzzy Hash: 0682d0525f26f26695730ce3270428992653feb2a4615428683965e127f80bed
                      • Instruction Fuzzy Hash: BBC12C72E101248BDB1ADF6DEDD15ACB3A5EB84300B56863DD8669F385E730AD44CBD0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,>$,>
                      • API String ID: 0-157805121
                      • Opcode ID: 93d41d3daa201f1d831701fbf5889da4e332b32a725f5d13ab6e194a84765ff1
                      • Instruction ID: 83eb113a0dc9dc0fe597b267597ddf6d62d4d09acdbe26fc12172f8c2d0c9af0
                      • Opcode Fuzzy Hash: 93d41d3daa201f1d831701fbf5889da4e332b32a725f5d13ab6e194a84765ff1
                      • Instruction Fuzzy Hash: 247115B4D10256CFEB29CF68C8D07FFBBB8EB19340F140269D955A7383C624991AC7A0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: J$U
                      • API String ID: 0-1755682265
                      • Opcode ID: 24bfc292d06bd2afd9d53709659aaa2e4f8db6c3ac864b46c23a8c74671575e0
                      • Instruction ID: 47baf70e2a8d511d8fa95eb1f080ad93068cf755bf81dc58a548e4fd9e52098b
                      • Opcode Fuzzy Hash: 24bfc292d06bd2afd9d53709659aaa2e4f8db6c3ac864b46c23a8c74671575e0
                      • Instruction Fuzzy Hash: 4631383110871A9FE304EF25D8829ABB7E0BB80314F448A1DB6DA53292D77CA545DF87
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4(=
                      • API String ID: 0-3642128101
                      • Opcode ID: cdd0bd773aeac7e639ac1ccfc012b82627686dc5ddb8dd697e1c066143d9a079
                      • Instruction ID: c68e2ac658782a43b35420f889ba1a8fb244fe6d6d6107300a13005598ec7a50
                      • Opcode Fuzzy Hash: cdd0bd773aeac7e639ac1ccfc012b82627686dc5ddb8dd697e1c066143d9a079
                      • Instruction Fuzzy Hash: 93A24974A00A02DFCB29CF68D1C0A6AB7F1FF49304F148669D4568BB52D734F996CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: D3
                      • API String ID: 0-3972625637
                      • Opcode ID: 0c5316f1b48f63a7bb38c0e6b3ea4f58914c08cb1eb6d5d8162fff3f7cf674ca
                      • Instruction ID: a20ef5cb3bccbb3b35f586d0520ba8a7bd18ba1ed199951a52a20b91afd5e55f
                      • Opcode Fuzzy Hash: 0c5316f1b48f63a7bb38c0e6b3ea4f58914c08cb1eb6d5d8162fff3f7cf674ca
                      • Instruction Fuzzy Hash: 593241B7F5161447DB0CCE5DDCA16EDB2E3AFD8224B1E803DA80AE3345EA79DD058684
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: x'=
                      • API String ID: 0-655236750
                      • Opcode ID: e16ab0b288899eaa6e58ab50f41c95e0ef9e7db3d246a204ff9c08201f48992c
                      • Instruction ID: 630e18cfac98d62758c9a148223cd8e9e5606c31f1a0ceffc9e138379bb66c5d
                      • Opcode Fuzzy Hash: e16ab0b288899eaa6e58ab50f41c95e0ef9e7db3d246a204ff9c08201f48992c
                      • Instruction Fuzzy Hash: C3625DB0E003059BDB16CF59C5C47AEBBB1AF88304F2581AEE805AB352DB75D946CB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: __allrem
                      • String ID:
                      • API String ID: 2933888876-0
                      • Opcode ID: 4cc452d52c494a6b4f7cab85431d7f5979f377a5412bf8613d1eb59dfdeb7610
                      • Instruction ID: fc69b24d2937bd2656afc88a93596da45cc8ebe646aeae510042d71ddd053cd6
                      • Opcode Fuzzy Hash: 4cc452d52c494a6b4f7cab85431d7f5979f377a5412bf8613d1eb59dfdeb7610
                      • Instruction Fuzzy Hash: 93817071A001459FDB19CF9CCC80AAEBBB5EF89704F5980A9E915EB342D335EE45CB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: __allrem
                      • String ID:
                      • API String ID: 2933888876-0
                      • Opcode ID: f6236e384e0100328f3c18778ce6eedc500b91834a32ac9b6a4968c2bb7cbbee
                      • Instruction ID: f566d5a4a86b0f2859c80b37a03034e972fda2fbd713c996781b41ff054c410a
                      • Opcode Fuzzy Hash: f6236e384e0100328f3c18778ce6eedc500b91834a32ac9b6a4968c2bb7cbbee
                      • Instruction Fuzzy Hash: BF615B716107408FCB29CF6DC880A5AFBF5AF95300B0489AEE986DB752D630F955CB90
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: ebb50a0d6f711a14c78bbd7cc2bd7cff3dc7edbaf937b2d3603def4245372500
                      • Instruction ID: 4216939d1211f610ecaf7316f7f3fdc5493875922b3f828619dfa34dcc4ba7d9
                      • Opcode Fuzzy Hash: ebb50a0d6f711a14c78bbd7cc2bd7cff3dc7edbaf937b2d3603def4245372500
                      • Instruction Fuzzy Hash: A9C1BC70900E4A8FCF27CF6CC684A7ABBB6FB05304F264719D8569B691D730AD45CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: ab3fa5fa9b3513e2c259515397e7c5a3e085e2a01b685d32c27cb86472dcd0b8
                      • Instruction ID: a3e8b045de7632516a75809d6787b473e3b450a02a7601ca4de8905330c524f1
                      • Opcode Fuzzy Hash: ab3fa5fa9b3513e2c259515397e7c5a3e085e2a01b685d32c27cb86472dcd0b8
                      • Instruction Fuzzy Hash: D3B1C170904E0A8BCF27CFA8C5966BEBBB5EB40300F154B1DD4929B691D731AE01CBD2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: -
                      • API String ID: 0-2547889144
                      • Opcode ID: 2a2e03b90355dc0d59000aeef2c7e7f9d6bd4af588e3a47cd3e57602e03e1696
                      • Instruction ID: b2a5858399bde1a1b181f242265d5b1ca449805444c8989c475e09a372b5a1e6
                      • Opcode Fuzzy Hash: 2a2e03b90355dc0d59000aeef2c7e7f9d6bd4af588e3a47cd3e57602e03e1696
                      • Instruction Fuzzy Hash: CBB1B2756107059FEB31CAA8CC80ABEF7F5FF44310F104A19E9AAE3690D771A946CB61
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: d
                      • API String ID: 0-2564639436
                      • Opcode ID: cbe94b3f5837054907e53f150b73c29a65f543e769350a0222dc5f867f012476
                      • Instruction ID: 28ef5921f74f1a18563ea8370762a16b3bb4372fad30c3004ed60ca5db02f63e
                      • Opcode Fuzzy Hash: cbe94b3f5837054907e53f150b73c29a65f543e769350a0222dc5f867f012476
                      • Instruction Fuzzy Hash: 82C191316087418FC715CF29C48055ABBE2AFD9304F198AADE8898F746DB35FD06CBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: W
                      • API String ID: 0-655174618
                      • Opcode ID: 9e1788dc7a08fa9ba0b9ea03b8fe38fb4d071d69b096e33b913ef6d18878afd3
                      • Instruction ID: 267c834da3eb027e1d5f20c0ed16adfd6353cba213cd028eb0abee1cc62c83e0
                      • Opcode Fuzzy Hash: 9e1788dc7a08fa9ba0b9ea03b8fe38fb4d071d69b096e33b913ef6d18878afd3
                      • Instruction Fuzzy Hash: C95158B19103998BDB26CF55D8C17AEBBF8FB48314F2586AAC405EB295D374D940CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0cb51f7959f340200f014bbbaf4069c2943f6fcadbfcaf3632146c857b3f8e8a
                      • Instruction ID: e958f5cafe0f8f5d6e084a75a904d18049f84f77d18c04e47b23973bba490eee
                      • Opcode Fuzzy Hash: 0cb51f7959f340200f014bbbaf4069c2943f6fcadbfcaf3632146c857b3f8e8a
                      • Instruction Fuzzy Hash: 8232AC716043418FD726DF28C481B1AFBF5BF88314F1589AEE9898B351D775E846CB82
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 011b84df6fdb0c1f5f87864c4f33c2b05fa9df882d4c2b9f2fc5fe41c6a84fee
                      • Instruction ID: a741c58c6805a42041be795fcb5af5de02c297871b999b59940657641971fad3
                      • Opcode Fuzzy Hash: 011b84df6fdb0c1f5f87864c4f33c2b05fa9df882d4c2b9f2fc5fe41c6a84fee
                      • Instruction Fuzzy Hash: 8A023675A04B008FC73ACF29C4C4A66B7E2FF88314F15495DE99A8BB52DB71E851CB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b80b37ecb74186be8c734b10355c4c601250e8bd0ee9413014499d52b291190a
                      • Instruction ID: 95016d257dd0e38d12e3e10a27d5586f37a8ac4d8fb2b04584ed53ed16ff8c87
                      • Opcode Fuzzy Hash: b80b37ecb74186be8c734b10355c4c601250e8bd0ee9413014499d52b291190a
                      • Instruction Fuzzy Hash: 0B025B759096158FCB09CF18D4D48F9BBF1EF68310F1A82EDD8899B366D3359980CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ErrorLast
                      • String ID:
                      • API String ID: 1452528299-0
                      • Opcode ID: cb3143b9f30a9efaa244ffd711325e2de46a066603496d109dfe988f3a2de644
                      • Instruction ID: 52216468cbf5647c3b73076681e11ab54a8a351a9013acec83541a9f968c24b8
                      • Opcode Fuzzy Hash: cb3143b9f30a9efaa244ffd711325e2de46a066603496d109dfe988f3a2de644
                      • Instruction Fuzzy Hash: 62B129755007019BDB3A9B25CC92BB7B3E8EF46708F15492DE983CA580FB74E981CB10
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 19520573e42289d9cda3940d629451c38ad52933884b8e810867c422e56ddbd0
                      • Instruction ID: 3ea17847a24bfd81fb270f33a76f7bebe8d930a3e8aec9fa0dd99bc1c81efc66
                      • Opcode Fuzzy Hash: 19520573e42289d9cda3940d629451c38ad52933884b8e810867c422e56ddbd0
                      • Instruction Fuzzy Hash: F4D1AEB0610B018BE765CF39D480796BBE1FF48314F148A6DD4EACB791EB74A489CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0711813a1fa8fe1654d16beb3f801dd9f4a269e7befb4bf0313f4af5961adda
                      • Instruction ID: 90d63dae3178acade36e548606a0f201448e32b51957c7766bb5e055adf32fda
                      • Opcode Fuzzy Hash: c0711813a1fa8fe1654d16beb3f801dd9f4a269e7befb4bf0313f4af5961adda
                      • Instruction Fuzzy Hash: E2B1DE716047019FD722CE64C8C0A6BBBE4EF98324F144A2DF9AA83790D774E9498B52
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 33b803b99e1efbab65681eb893126d6210d390dd774f91a9e893d316d0bad354
                      • Instruction ID: 01989f37a10c33dd9e62413fb278607fe3c3c28f7e4bcbcd6a2f887c52378cc6
                      • Opcode Fuzzy Hash: 33b803b99e1efbab65681eb893126d6210d390dd774f91a9e893d316d0bad354
                      • Instruction Fuzzy Hash: 9AB12F35510609DFD71ACF28C48AB657BE0FF4A364F2A8658E8D9CF2A1C735D991CB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 41d31ba86242bfd7bd76f9ba221a1519e07e8bc4f3f0aa95c67da6b44e1bb030
                      • Instruction ID: 2b5973eb07ac956c1cddd78ca78d810b5c68f6ba400bc8120fce185e14cc2537
                      • Opcode Fuzzy Hash: 41d31ba86242bfd7bd76f9ba221a1519e07e8bc4f3f0aa95c67da6b44e1bb030
                      • Instruction Fuzzy Hash: EC61B731A40609AFDB31DAA8CC80BEEFBF5EF45310F108AA9E596D37D0D274A685C751
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ebc9979209e43906842b33ed070c63749a0471b8e85d9898ec11cbb21d5f8040
                      • Instruction ID: 53a28f29d26b1ba6976c401039e54ffebc9d7791f24a63dfb4fc6c2dc4d9eec5
                      • Opcode Fuzzy Hash: ebc9979209e43906842b33ed070c63749a0471b8e85d9898ec11cbb21d5f8040
                      • Instruction Fuzzy Hash: 8861B0312105644FD71ACF1EECC49663379E38A301B8B466AEAC1DB396C735F926C7A0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b6fbd008fba7024008a73466831a910c6b46a3fbbbc449b750397b59804f1b58
                      • Instruction ID: 167a831e050beb7023b0c10722dd88b5ea5964a83d2bd62e28f35c6181e28dc3
                      • Opcode Fuzzy Hash: b6fbd008fba7024008a73466831a910c6b46a3fbbbc449b750397b59804f1b58
                      • Instruction Fuzzy Hash: 8151BF71E1021A9FCB19EF98D891BEEBBB4FF48310F14466DE819A7341D7709A54CBA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1981d3f4efc1d7326e7ec73675bf0ba9eb9b58bdf0e432d0af5ce1f2cd5c2c28
                      • Instruction ID: 71e9eb0f584adf300c9e5b3621335b5146691a4d91767a2298012cbe773b1f78
                      • Opcode Fuzzy Hash: 1981d3f4efc1d7326e7ec73675bf0ba9eb9b58bdf0e432d0af5ce1f2cd5c2c28
                      • Instruction Fuzzy Hash: C8517F72D00219EFDF16CF98C840AEEBBB6FF88304F5A8459E515AB301D7359A91CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1b63d64401bd7e6c0b9e96cbe20f5ac7b232a30cab2b22ebf5df1188a7b10d86
                      • Instruction ID: 43aa76faf3864324e2f0e3c26d3cd092c6a6e7def6a02ebd7bd8e6756db1a7ce
                      • Opcode Fuzzy Hash: 1b63d64401bd7e6c0b9e96cbe20f5ac7b232a30cab2b22ebf5df1188a7b10d86
                      • Instruction Fuzzy Hash: BE21A641E1A6A84BDB01593EC890792BFC1C792329F28D3F4D8588FBDED514B409C3E1
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 854d7f0168f0dc93b040c5b83782ce3004fb363419dbd7899f20dfa3d1eb45b6
                      • Instruction ID: 126745882d913a4b1fb6004a31d92dca9ec598ee8fe6be0978e3288691db98e8
                      • Opcode Fuzzy Hash: 854d7f0168f0dc93b040c5b83782ce3004fb363419dbd7899f20dfa3d1eb45b6
                      • Instruction Fuzzy Hash: 25316F71600B058FC366CEB9C8817A3B7E5FB49314F550A6ED6EAC7280C6B4F984CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 19e454e24aa5901306454e9e2ba1d41df90ca2b98c9ecabfb45b11066f9b7127
                      • Instruction ID: 73be1fdfe97126da8a55fe90443792896676d593518a43fdf0a22ae43e339be0
                      • Opcode Fuzzy Hash: 19e454e24aa5901306454e9e2ba1d41df90ca2b98c9ecabfb45b11066f9b7127
                      • Instruction Fuzzy Hash: FAE0ECB0A04049EB8A51BE54DC824DD73E1BB84304F204420F954DB315E738EE259756
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Close
                      • String ID: #$>$.50,$.50,$:$-*$:$-*$<20$$=*.$MKH^$RI}P$chag$chagqxjt$f|erfp
                      • API String ID: 3535843008-2249345429
                      • Opcode ID: de862cedce422b6b0f92d6f1453c90e9e16a9fdfb3da978096d9cc4b044b9aa3
                      • Instruction ID: 3e887481082de47d0dcdd1cd7ae216f119ea65e1ca1a7c8a50b60d1f2a13c9d2
                      • Opcode Fuzzy Hash: de862cedce422b6b0f92d6f1453c90e9e16a9fdfb3da978096d9cc4b044b9aa3
                      • Instruction Fuzzy Hash: CE71D170D102489FDF18EFA4D890BEEBBB8EF19304F64425DE845BB282E7719506CB65
                      APIs
                      • GetProcAddress.KERNEL32(00000000,?), ref: 002B8C64
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: (3'"$Lw[V$T$V_ST$YtPk$^EV_$wTF|$wTF|V_STLw[VYtPk(3'"
                      • API String ID: 190572456-3590895520
                      • Opcode ID: 701eabd2dea77752ca8ed87d56f76d60eab64e441e1b02e504620f29468b51ec
                      • Instruction ID: a8650184530e1ad6aff1676789387840e6891f759d67cc9a7669e2401862ad83
                      • Opcode Fuzzy Hash: 701eabd2dea77752ca8ed87d56f76d60eab64e441e1b02e504620f29468b51ec
                      • Instruction Fuzzy Hash: DB31E270914389EEEF05DFA4C845BEFBBB8EF04744F50006EE805BA181E7B59605C7A9
                      APIs
                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?,?,?,?), ref: 002E8B3F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: FolderPath
                      • String ID: R\ZR$T^E]XZWSgQSHHRLF$U$`C]U$`PF[$cannot use operator[] with a string argument with $lA@\
                      • API String ID: 1514166925-1062347976
                      • Opcode ID: 639e300bac14a5deb29db5beeb7b3211f31d278ab6cfc5ea62b0cca3972816eb
                      • Instruction ID: 439e50b16ef4db9fb152efbfbd65e8bd1c603e96a6e3f42a668330fd8a8dc82d
                      • Opcode Fuzzy Hash: 639e300bac14a5deb29db5beeb7b3211f31d278ab6cfc5ea62b0cca3972816eb
                      • Instruction Fuzzy Hash: 9AD1D1709102989FEB19CB24CC85BDDB779AF06304F5441E9E44DAB282DB749F89CFA1
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0031E323
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0031E345
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0031E3FD
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0031E449
                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0031E463
                      • std::_Facet_Register.LIBCPMT ref: 0031E505
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: std::_$LockitLockit::_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                      • String ID: bad locale name
                      • API String ID: 3514410213-1405518554
                      • Opcode ID: 37a826f9039f30f0fe535910e4de1fcc22f950ba357c253cddca41f4230aee25
                      • Instruction ID: eb25f87b69e1fe74c0de3780608ef710f09c6267e27764ce8789db869fdb6aa1
                      • Opcode Fuzzy Hash: 37a826f9039f30f0fe535910e4de1fcc22f950ba357c253cddca41f4230aee25
                      • Instruction Fuzzy Hash: 4861AFB5E00244DBDF16EFA4C885BDEBBB4AF18310F144598E854AB381EB31D945CBA2
                      APIs
                      • GetFileAttributesA.KERNEL32(?), ref: 002BE53C
                      • GetLastError.KERNEL32 ref: 002BE547
                      • __Mtx_unlock.LIBCPMT ref: 002BE562
                      • __Mtx_unlock.LIBCPMT ref: 002BE571
                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 002BE588
                      • CopyFileA.KERNEL32(?,?,00000000), ref: 002BE5F0
                      • FindNextFileA.KERNEL32(00000000,?,?,?,?,?,191C1B6C,?,?,191C1B6C,191C1B6D), ref: 002BE604
                      • GetLastError.KERNEL32(00000000,00000000,?,?,?,?,191C1B6C,?,?,191C1B6C,191C1B6D), ref: 002BE61A
                      • GetLastError.KERNEL32(?,?,?,?,191C1B6C,?,?,191C1B6C,191C1B6D), ref: 002BE630
                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,00000000), ref: 002BE7F0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ErrorFileLast$Mtx_unlock$AttributesCopyCreateDirectoryFindFolderNextPath
                      • String ID: .
                      • API String ID: 745826957-248832578
                      • Opcode ID: ff541bac97673f0cda62d2ca59ced98c9fd42badadf3c066e9ae51ba5c106e36
                      • Instruction ID: c6408b7745ca9c22d3d141219d3489896c5729204c6d09ffe9b9d4c151acde8b
                      • Opcode Fuzzy Hash: ff541bac97673f0cda62d2ca59ced98c9fd42badadf3c066e9ae51ba5c106e36
                      • Instruction Fuzzy Hash: 62D10FB19202089BEF1CDF28CC89BEDBB7ABF15340F554258E416AB7C2D7349991CB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: _strrchr
                      • String ID:
                      • API String ID: 3213747228-0
                      • Opcode ID: 74de2fde90784ff470486f2bda14f06e9c85ae0d91867898de652616e41cd3fb
                      • Instruction ID: 3bd07a8ed4d03c7f7d33dabc7a6fbc7e56b89b1c6ca23e2b9a79244b7e35c4f7
                      • Opcode Fuzzy Hash: 74de2fde90784ff470486f2bda14f06e9c85ae0d91867898de652616e41cd3fb
                      • Instruction Fuzzy Hash: 34B127729002659FDB178F68CC83BAE7BA5EF5B314F1D4166E904AF282D274D901C7A0
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 00391937
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0039193F
                      • _ValidateLocalCookies.LIBCMT ref: 003919C8
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 003919F3
                      • _ValidateLocalCookies.LIBCMT ref: 00391A48
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: 39fdf5cdc5ab3841b9bfe1a28718ea1e38a624abdcb14d0ef0266ba902893e84
                      • Instruction ID: 04c12b5e44f83cefcfb7adac559298d72e4ff3d72c2aa0f66be34a6b20be6430
                      • Opcode Fuzzy Hash: 39fdf5cdc5ab3841b9bfe1a28718ea1e38a624abdcb14d0ef0266ba902893e84
                      • Instruction Fuzzy Hash: D941D435A00209ABCF12DF69C895AEEBBE4AF44314F148156E819AB392D731EE45CB91
                      APIs
                      • GetFileAttributesA.KERNEL32(2B161CF7,?,2B161D98,?,?,003B4E2B,000000FF,2B161E27,002C8851,2B161D98,?,00000001), ref: 002C5A9B
                      • CreateDirectoryA.KERNEL32(2B161CF7,00000000,?,?,?,?,?,003B4E2B,000000FF,2B161E27,002C8851,2B161D98,?,00000001), ref: 002C5B59
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AttributesCreateDirectoryFile
                      • String ID: RPj$X}S[$|TUR$|TURX}S[H\H
                      • API String ID: 3401506121-3311416963
                      • Opcode ID: c1b0ef3cd13922e529021a8a9a40da3f90993257f4879021a5c0004e1dcfa07e
                      • Instruction ID: dfcb361ca478f669b2c3ac0f79c72f4c13f91a3d8299a2764e8b2f1bc0e5a9d7
                      • Opcode Fuzzy Hash: c1b0ef3cd13922e529021a8a9a40da3f90993257f4879021a5c0004e1dcfa07e
                      • Instruction Fuzzy Hash: 0441E371A10A508FCB29DF28D881B9EB7F9EB04314F50072EE4099B7D1D731A980CB94
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: \$abcdefghijklmnopqrstuvwxyz0123456789_ABCDEFGHIJKLMNOPQRSTUVWXYZ$hR>
                      • API String ID: 0-1660423820
                      • Opcode ID: dffc30a0757dbd6937daee634f1a54fb34fef1cdb1e8e2de2e5a6cb0a4cc5507
                      • Instruction ID: 0813b41e669a63cc775fa8b57c79d6fb97be083bd7d705f1ecdc351a947e4a9d
                      • Opcode Fuzzy Hash: dffc30a0757dbd6937daee634f1a54fb34fef1cdb1e8e2de2e5a6cb0a4cc5507
                      • Instruction Fuzzy Hash: 58E1AF71D102498FDB09DFA8C885BAEBBB5FF08300F14CA5DE415AB782D7759A45CB90
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 002B75BE
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 002B75CD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: at line $, column $yo+
                      • API String ID: 4194217158-420633916
                      • Opcode ID: c52b547afc8c1405bd5cac2b608b76c49bcd263515aa30b9da3e01670b68e5a6
                      • Instruction ID: 27812cfc23a62a36b147f57e5230d58f8d6c1751b65f8f9b352e8ebb0af0b90f
                      • Opcode Fuzzy Hash: c52b547afc8c1405bd5cac2b608b76c49bcd263515aa30b9da3e01670b68e5a6
                      • Instruction Fuzzy Hash: F6611571A042059FDB19DF68DC85BEDBBB6FF88300F24462CE415A7B82D774AA54CB90
                      APIs
                      • std::_Lockit::_Lockit.LIBCPMT ref: 0031F7A1
                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0031F7F4
                      • __Getcoll.LIBCPMT ref: 0031F806
                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0031F825
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: std::_$Locinfo::_$GetcollLocinfo_ctorLocinfo_dtorLockitLockit::_
                      • String ID: bad locale name
                      • API String ID: 3738408318-1405518554
                      • Opcode ID: dec0d1643418c06b8b1fbba187dd6a897c3b6392faef6eecb1b84258abc85fa9
                      • Instruction ID: 4112a684b206e9864a8b85d30d51c3d6337eeab300485e2b2d4bcf2ad4fd039d
                      • Opcode Fuzzy Hash: dec0d1643418c06b8b1fbba187dd6a897c3b6392faef6eecb1b84258abc85fa9
                      • Instruction Fuzzy Hash: FA516EB1D102489FEF15EFE4C8857CEBBB8AF18314F144569E804EB381E7759949CBA2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID: %3
                      • API String ID: 0-1638272713
                      • Opcode ID: 2f17deb89200a4916d145705dc0590648ed55fe470763717517df29d91a636b0
                      • Instruction ID: 982bd0612fec6092c00c6362b4dd948848db16165b71f80416176fd94bf9938a
                      • Opcode Fuzzy Hash: 2f17deb89200a4916d145705dc0590648ed55fe470763717517df29d91a636b0
                      • Instruction Fuzzy Hash: B241B671A00748AFEB26DF78CC45BAABBA9EB48710F10452AF155DF781D7B199408B90
                      APIs
                        • Part of subcall function 00342950: GetVersionExA.KERNEL32(?), ref: 00342976
                      • GetVersionExA.KERNEL32(?), ref: 00342EF3
                      • GetLastError.KERNEL32(00000000,?,00000000,?,00000000), ref: 00342F26
                      • Sleep.KERNEL32(00000064,00000000,?,00000000), ref: 00342F3C
                      • GetLastError.KERNEL32(00000000), ref: 00342F59
                      • Sleep.KERNEL32(00000064,00000000), ref: 00342F6F
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ErrorLastSleepVersion
                      • String ID:
                      • API String ID: 2145038200-0
                      • Opcode ID: 3d32a625bdb467a8c53126dccd37c40f3ba0aa4242a9699657502bac3b8e8687
                      • Instruction ID: 3f168ce68284cf91b38e6f01f1382d6aae94375a7c18f8b77e137acbf8d72c02
                      • Opcode Fuzzy Hash: 3d32a625bdb467a8c53126dccd37c40f3ba0aa4242a9699657502bac3b8e8687
                      • Instruction Fuzzy Hash: 81216832D046048FCB22AB78AC8466F73F8DB16328FD141EAF90EEB140EA346C458B41
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: __freea
                      • String ID: a/p$am/pm
                      • API String ID: 240046367-3206640213
                      • Opcode ID: fe6d5b09fed97bed1f90df5e2238718ef32d325a0223fa7b2ffd7bb2e3060bcd
                      • Instruction ID: dd850e6f91fbc5a3cbd282e4adef6ebd18f72643fa98a64adfc00a8fb76bcadc
                      • Opcode Fuzzy Hash: fe6d5b09fed97bed1f90df5e2238718ef32d325a0223fa7b2ffd7bb2e3060bcd
                      • Instruction Fuzzy Hash: C8C10135E04206DFCF2B9F68C894ABAB7B4FF09710F168069E905EB662D3359D41CB51
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: __alldvrm__allrem
                      • String ID: M]4$M]4
                      • API String ID: 1673774721-632438782
                      • Opcode ID: 95142e094ac9602de11ebfa111b6ef39a809850b2ef176966b0be36d55b17f61
                      • Instruction ID: 69c71ded7c3fecc99667e95cb0e85883b7ca7fcaad89977c188171f39e2d725b
                      • Opcode Fuzzy Hash: 95142e094ac9602de11ebfa111b6ef39a809850b2ef176966b0be36d55b17f61
                      • Instruction Fuzzy Hash: 6A4118B5E00219AFCF15DF99D881AAEFBF5EF48310F15816AE905AB311D734AD00CBA0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ErrorLast__dosmaperr
                      • String ID:
                      • API String ID: 1659562826-0
                      • Opcode ID: 7a00f60527fc00d7a7598dcbf9575a30def8d3efbef0284928dcf4c9fc931266
                      • Instruction ID: 52ff48323df2dff5a9dd7a471fdfc31cfe34ac2df98479448fbc880c3018f545
                      • Opcode Fuzzy Hash: 7a00f60527fc00d7a7598dcbf9575a30def8d3efbef0284928dcf4c9fc931266
                      • Instruction Fuzzy Hash: 4521F671600205AFDF23AF76D881C6BF7ADFF46364B018519F9199B562DB31EC018BA0
                      APIs
                      • GetProcAddress.KERNEL32(00000000,gbs`Q[R), ref: 002CE562
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: AddressProc
                      • String ID: Ws2_32.dll$gbs`Q[R
                      • API String ID: 190572456-463361242
                      • Opcode ID: 7320ec0399fcbdf1133166884ae21276ce3665113f88fba9f23970e937d49103
                      • Instruction ID: e242a5969c543959836ebee86728b13c6fe2fbcda4a51c81c5703390ee682457
                      • Opcode Fuzzy Hash: 7320ec0399fcbdf1133166884ae21276ce3665113f88fba9f23970e937d49103
                      • Instruction Fuzzy Hash: 15E19E70620251DFEF29CF68C880B6DBBA6FF45310F254A5DE4A29B3C2D771A951CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3907804496
                      • Opcode ID: 9282e06950ec50e95d2aa11c51c61ecea8a085cafc769c155ae225e220370df9
                      • Instruction ID: 81b7a5af8b1919d0855acfdbdb75b4e650126176d297f7e57afd8591a7a3a49e
                      • Opcode Fuzzy Hash: 9282e06950ec50e95d2aa11c51c61ecea8a085cafc769c155ae225e220370df9
                      • Instruction Fuzzy Hash: 5CA1D574A08248AFDF17DFA9D881BADBBB5EF4A314F144258F5149F292CB709A41CB50
                      APIs
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 002B6F11
                      • ___std_exception_destroy.LIBVCRUNTIME ref: 002B6F20
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ___std_exception_destroy
                      • String ID: [json.exception.
                      • API String ID: 4194217158-791563284
                      • Opcode ID: ceb592cb666900915f80a0848d828f6426edd5e8d7c3217099b77c08cd877017
                      • Instruction ID: 16be0ce2382bfc5f6621cef617b7fed4c22859b0a228830ec54de0c01e5bb6c0
                      • Opcode Fuzzy Hash: ceb592cb666900915f80a0848d828f6426edd5e8d7c3217099b77c08cd877017
                      • Instruction Fuzzy Hash: D991D370A102049FDB19CF68C889BDEBBF5EF44300F20866DE415AB792D775E981CB50
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Mtx_unlockSleep
                      • String ID: }pbOh
                      • API String ID: 2676483549-3548698129
                      • Opcode ID: 8f669b097d2eaecc73d276eb5403558af470f32b2ebde44ee4f7960415c57768
                      • Instruction ID: b0a83e6647934e6606237dd9ce991705524d5f12e6332823cc7128e0915035c9
                      • Opcode Fuzzy Hash: 8f669b097d2eaecc73d276eb5403558af470f32b2ebde44ee4f7960415c57768
                      • Instruction Fuzzy Hash: A5516971910149ABDF09EF68CD46BEE7B7EDB05304F20836CF8109B6C2DA74995987E2
                      APIs
                      • GetVersionExA.KERNEL32(?), ref: 00342A70
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Version
                      • String ID: %s\etilqs_$>
                      • API String ID: 1889659487-2315843240
                      • Opcode ID: 3d5dd2d37121fe9414855a28fbfb85f9a6537ca11956dc2ab64addb8563146ea
                      • Instruction ID: 49331e6c1ad12a61715133578048ef0b19629acf1a2aa4fbc1c481d91028f129
                      • Opcode Fuzzy Hash: 3d5dd2d37121fe9414855a28fbfb85f9a6537ca11956dc2ab64addb8563146ea
                      • Instruction Fuzzy Hash: 76516B319042985DE727DB698C417FABBE4EF1A300F4905E9E594EA0C2DA746A81CBA1
                      APIs
                      • Concurrency::cancel_current_task.LIBCPMT ref: 0032CF81
                      Strings
                      • type must be string, but is , xrefs: 0032CFE8
                      • type must be boolean, but is , xrefs: 0032D072
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Concurrency::cancel_current_task
                      • String ID: type must be boolean, but is $type must be string, but is
                      • API String ID: 118556049-436076039
                      • Opcode ID: 93193d997564d06f5ff3726fce2d2fb14ba89c2978bddfe5a32f732965e9bd62
                      • Instruction ID: 04904e2665d168d599978f558c9515b2b792f2fe075e904e1e2569e1ed9bc9cf
                      • Opcode Fuzzy Hash: 93193d997564d06f5ff3726fce2d2fb14ba89c2978bddfe5a32f732965e9bd62
                      • Instruction Fuzzy Hash: 3C415AB1D10248AFDB06EBA4E902BDEB7AADB14300F104675F419DB781EB35AA54C792
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Catch
                      • String ID: MOC$RCC
                      • API String ID: 78271584-2084237596
                      • Opcode ID: f5c8718af9637b26ad0f108d3b039dc862457850545717bb2f636a52405a3a16
                      • Instruction ID: 40241f8e55b754713fa50a01677b37713bb1f1ce024cb67c82afe5048831d74e
                      • Opcode Fuzzy Hash: f5c8718af9637b26ad0f108d3b039dc862457850545717bb2f636a52405a3a16
                      • Instruction Fuzzy Hash: 0B418A72900609BFCF16DF98C981AAEBBB5FF48300F1A8499F9147A261D3359960DB50
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: Mtx_unlock
                      • String ID: QRL5$wGQR5
                      • API String ID: 1418687624-2169126700
                      • Opcode ID: 6a021dbec1413e710ff81ba084d2987626699ac957de1047a3c9510d51b8892c
                      • Instruction ID: 32d8cadc64c93836566ea2b8274b797b691136f44461139b94a1c841d61b2a61
                      • Opcode Fuzzy Hash: 6a021dbec1413e710ff81ba084d2987626699ac957de1047a3c9510d51b8892c
                      • Instruction Fuzzy Hash: D82155729102018BEB18DF68CD897EDB7B6EF54355F148218E402AB6C2D7749990CBA6
                      APIs
                      • GetLastError.KERNEL32(x9,?,003978E1,?,?,?,00000000), ref: 003A626B
                      • __dosmaperr.LIBCMT ref: 003A6272
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4105234120.00000000002B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 002B0000, based on PE: true
                      • Associated: 00000000.00000002.4105200278.00000000002B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105335483.00000000003BD000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105364714.00000000003E1000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105384341.00000000003E6000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105482075.0000000000501000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105501525.0000000000502000.00000020.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4105686809.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2b0000_LisectAVT_2403002A_262.jbxd
                      Similarity
                      • API ID: ErrorLast__dosmaperr
                      • String ID: x9
                      • API String ID: 1659562826-1557327722
                      • Opcode ID: f1e897b814f62d594dac233c6f6c62373a0bd42a38e66531129966c4740b0454
                      • Instruction ID: 66ae3ed4aa63b4f72248fc0024c4315132267059cdc281d39c381a284350f64b
                      • Opcode Fuzzy Hash: f1e897b814f62d594dac233c6f6c62373a0bd42a38e66531129966c4740b0454
                      • Instruction Fuzzy Hash: 4ED0223304410823CE013AFABD0980B3B6DCBC23787000B21F16DC40D0EE35C8019424