Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_482.exe

Overview

General Information

Sample name:LisectAVT_2403002A_482.exe
Analysis ID:1482213
MD5:8121ad7d4b71fae42dd6c4309774c4b7
SHA1:3ef344fc8aca4cd2d024d5f389e7a7325e2242dc
SHA256:cf3f993a1f57ff01cc5ba08b79282ece75860c3cfa7ab1339857b51db172cc66
Tags:exe
Infos:

Detection

PureLog Stealer, RedLine, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Enables security privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_482.exe (PID: 1664 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_482.exe" MD5: 8121AD7D4B71FAE42DD6C4309774C4B7)
    • MSBuild.exe (PID: 4684 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 4324 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • conhost.exe (PID: 5640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
LisectAVT_2403002A_482.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    LisectAVT_2403002A_482.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      LisectAVT_2403002A_482.exeINDICATOR_EXE_Packed_DotNetReactorDetects executables packed with unregistered version of .NET ReactorditekSHen
      • 0x1848bd:$s2: is protected by an unregistered version of .NET Reactor!" );</script>
      LisectAVT_2403002A_482.exeMALWARE_Win_zgRATDetects zgRATditekSHen
      • 0x184519:$s1: file:///
      • 0x184475:$s2: {11111-22222-10009-11112}
      • 0x1844a9:$s3: {11111-22222-50001-00000}
      • 0x1651c4:$s4: get_Module
      • 0x15c3ec:$s5: Reverse
      • 0x14b942:$s6: BlockCopy
      • 0x16052b:$s7: ReadByte
      • 0x18452b:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
      SourceRuleDescriptionAuthorStrings
      00000004.00000002.1286915263.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000000.00000002.1269206159.0000000005286000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.1269206159.0000000004C02000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000000.00000000.1257963712.0000000000AA2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              Process Memory Space: LisectAVT_2403002A_482.exe PID: 1664JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                Click to see the 1 entries
                SourceRuleDescriptionAuthorStrings
                4.2.MSBuild.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.LisectAVT_2403002A_482.exe.4f33660.2.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    0.2.LisectAVT_2403002A_482.exe.4f33660.2.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                        0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                          Click to see the 3 entries
                          No Sigma rule has matched
                          No Snort rule has matched
                          Timestamp:2024-07-25T19:36:04.889246+0200
                          SID:2022930
                          Source Port:443
                          Destination Port:49706
                          Protocol:TCP
                          Classtype:A Network Trojan was detected
                          Timestamp:2024-07-25T19:36:43.685277+0200
                          SID:2022930
                          Source Port:443
                          Destination Port:49710
                          Protocol:TCP
                          Classtype:A Network Trojan was detected

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: LisectAVT_2403002A_482.exeAvira: detected
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
                          Source: LisectAVT_2403002A_482.exeJoe Sandbox ML: detected
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E98DEE0 CryptReleaseContext,0_2_6E98DEE0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E98DE00 CryptGenRandom,__CxxThrowException@8,0_2_6E98DE00
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E98DD20 CryptReleaseContext,0_2_6E98DD20
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E98DBB0 CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptAcquireContextA,CryptAcquireContextA,SetLastError,__CxxThrowException@8,0_2_6E98DBB0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E98D9D0 CryptAcquireContextA,GetLastError,0_2_6E98D9D0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E98D7D5 CryptReleaseContext,0_2_6E98D7D5
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E98D7F0 CryptReleaseContext,0_2_6E98D7F0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9B35E0 CryptReleaseContext,0_2_6E9B35E0
                          Source: LisectAVT_2403002A_482.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          Source: LisectAVT_2403002A_482.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: LisectAVT_2403002A_482.exe, 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1269206159.0000000004C02000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.0000000006014000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1328134433.0000000006E50000.00000004.08000000.00040000.00000000.sdmp, Protect544cd51a.dll.0.dr
                          Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: LisectAVT_2403002A_482.exe, 00000000.00000002.1328134433.0000000006F0A000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.00000000060D1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.0000000005F46000.00000004.00000800.00020000.00000000.sdmp
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then jmp 0329A33Ah0_2_0329A288
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291930
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291B48
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_03299F58
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291B50
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_03299F50
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291A38
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291A40
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then jmp 03299B42h0_2_03299A88
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then jmp 0329A33Ah0_2_0329A280
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then jmp 03299B42h0_2_03299A90
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291929
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_03290560
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_03290554
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291C60
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 4x nop then mov dword ptr [ebp-14h], 40000003h0_2_03291C5A
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                          Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldbh equals www.youtube.com (Youtube)
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: copyFrom+https://me.yahoo.com/Khttps://www.google.com/accounts/o8/id3https://www.myopenid.com/;https://pip.verisignlabs.com/+https://myvidoop.com/ equals www.yahoo.com (Yahoo)
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                          Source: global trafficDNS traffic detected: DNS query: time.windows.com
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://axschema.org/birthDateQhttp://axschema.org/contact/country/homeChttp://axschema.org/contact/e
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://docs.oasis-open.org/xri/xrd/2009/01#canonicalize-raw-octets
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://ocsp.sectigo.com0
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://reltype.google.com/openid/xrd-op
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://specs.openid.net/auth/2.0_Provider
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://www.iana.org/assignments/relation/describedby
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: http://www.idmanagement.gov/schema/2009/05/icam/openid-trust-level1.pdfuhttp://www.idmanagement.gov/
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: https://me.yahoo.com/Khttps://www.google.com/accounts/o8/id3https://www.myopenid.com/;https://pip.ve
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: https://myvidoop.com/
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: https://sectigo.com/CPS0
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: https://www.google.com/accounts/o8/.well-known/host-meta?hd=
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                          Source: MSBuild.exe, 00000004.00000002.1294504509.00000000030C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_19dc8be6-2

                          System Summary

                          barindex
                          Source: LisectAVT_2403002A_482.exe, type: SAMPLEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
                          Source: LisectAVT_2403002A_482.exe, type: SAMPLEMatched rule: Detects zgRAT Author: ditekSHen
                          Source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables packed with unregistered version of .NET Reactor Author: ditekSHen
                          Source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                          Source: 0.2.LisectAVT_2403002A_482.exe.4f33660.2.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E95B6B00_2_6E95B6B0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E984EE00_2_6E984EE0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9AAC290_2_6E9AAC29
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E952D700_2_6E952D70
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E974AC00_2_6E974AC0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9A0B890_2_6E9A0B89
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E938B300_2_6E938B30
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9749700_2_6E974970
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9366500_2_6E936650
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E93C7B00_2_6E93C7B0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E93A7E00_2_6E93A7E0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9745500_2_6E974550
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9AA54D0_2_6E9AA54D
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9863B00_2_6E9863B0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9923100_2_6E992310
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E94A0C00_2_6E94A0C0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E985EB90_2_6E985EB9
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E973E500_2_6E973E50
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9A9FFC0_2_6E9A9FFC
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9ABFF10_2_6E9ABFF1
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E973C900_2_6E973C90
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E991CA00_2_6E991CA0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9A5DD20_2_6E9A5DD2
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E985DD00_2_6E985DD0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9A9AAB0_2_6E9A9AAB
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9858D50_2_6E9858D5
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9858D70_2_6E9858D7
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9858300_2_6E985830
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9AB9640_2_6E9AB964
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9734600_2_6E973460
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9852740_2_6E985274
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9732600_2_6E973260
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9850500_2_6E985050
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_0175A5780_2_0175A578
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_01758C780_2_01758C78
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_01750EAF0_2_01750EAF
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_0175E0000_2_0175E000
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_017573FA0_2_017573FA
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_017525240_2_01752524
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4_2_0104A5934_2_0104A593
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: SecurityJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: String function: 6E99D520 appears 31 times
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: String function: 6E9990D8 appears 51 times
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: String function: 6E999B35 appears 141 times
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1269206159.0000000004C02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePyrophobia.exe" vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1328134433.0000000006FD8000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000000.1258343665.0000000000E58000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamestationmainsoftware_wave.exeT2 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.00000000061E3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePyrophobia.exe" vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1298985795.0000000005770000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.0000000006014000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1264804436.0000000001417000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.00000000061A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWindowsApp1.dll8 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1331252332.00000000073A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exe, 00000000.00000002.1268496958.00000000032F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameProtect.dll8 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exeBinary or memory string: OriginalFilenamestationmainsoftware_wave.exeT2 vs LisectAVT_2403002A_482.exe
                          Source: LisectAVT_2403002A_482.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          Source: LisectAVT_2403002A_482.exe, type: SAMPLEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
                          Source: LisectAVT_2403002A_482.exe, type: SAMPLEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                          Source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_EXE_Packed_DotNetReactor author = ditekSHen, description = Detects executables packed with unregistered version of .NET Reactor
                          Source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                          Source: LisectAVT_2403002A_482.exe, AES128CBC.csCryptographic APIs: 'TransformBlock'
                          Source: LisectAVT_2403002A_482.exe, TripleDESCBC.csCryptographic APIs: 'CreateDecryptor'
                          Source: LisectAVT_2403002A_482.exe, TripleDESCBC.csCryptographic APIs: 'TransformBlock'
                          Source: LisectAVT_2403002A_482.exe, Certificate.csCryptographic APIs: 'TransformBlock'
                          Source: LisectAVT_2403002A_482.exe, iQni2irWV7wBVewwPJ.csCryptographic APIs: 'TransformFinalBlock'
                          Source: LisectAVT_2403002A_482.exe, Ssl3CipherSuites.csCryptographic APIs: 'CreateDecryptor'
                          Source: LisectAVT_2403002A_482.exe, W4tm6BPxnCpSlBMF6w1.csCryptographic APIs: 'CreateDecryptor'
                          Source: LisectAVT_2403002A_482.exe, W4tm6BPxnCpSlBMF6w1.csCryptographic APIs: 'CreateDecryptor'
                          Source: LisectAVT_2403002A_482.exe, Tls1CipherSuites.csCryptographic APIs: 'CreateDecryptor'
                          Source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: .configAMSBUILDDIRECTORYDELETERETRYCOUNTCMSBUILDDIRECTORYDELETRETRYTIMEOUT.sln
                          Source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
                          Source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
                          Source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: *.sln
                          Source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBuild MyApp.csproj /t:Clean
                          Source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: /ignoreprojectextensions:.sln
                          Source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBUILD : error MSB1048: Solution files cannot be debugged directly. Run MSBuild first with an environment variable MSBUILDEMITSOLUTION=1 to create a corresponding ".sln.metaproj" file. Then debug that.
                          Source: classification engineClassification label: mal100.troj.evad.winEXE@6/3@1/0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LisectAVT_2403002A_482.exe.logJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Protect544cd51a.dll
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5640:120:WilError_03
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeFile created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to behavior
                          Source: LisectAVT_2403002A_482.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: LisectAVT_2403002A_482.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: InstalledLabel-InstalledPackagesLabel/InstallLicenseAgreement
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: InstalledLabel-InstalledPackagesLabel/InstallLicenseAgreement
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: ~/packages/Install.cshtml
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: @import url(../installer.css);
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: background:url("../images/Installer_body_bg.png") #e3e4e8;
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: @import url(../installer.css);
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: include "./InstallCustomizationProductListGrid.tis";
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: <td><button type="checkbox" checked style="foreground-image:url(../images/Install_Antivirus_small.png);"></button>Install COMODO Antivirus</td>
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: <td><button type="checkbox" checked style="../images/Install_Antivirus_small.png);"></button>
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: <td><button type="checkbox" checked style="foreground-image:url(../images/installer_min_ui_icon.png);"></button>
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: <td><button type="checkbox" checked style="foreground-image:url(../images/installer_min_ui_icon.png);"></button>2. I want PrivDog block</td>
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: foreground-image:url("../images/installer_min_ui_icon.png");
                          Source: LisectAVT_2403002A_482.exeString found in binary or memory: <body class="SingleFrameBase" caption="Post-install call offer">
                          Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_482.exe "C:\Users\user\Desktop\LisectAVT_2403002A_482.exe"
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dwrite.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                          Source: LisectAVT_2403002A_482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: LisectAVT_2403002A_482.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                          Source: LisectAVT_2403002A_482.exeStatic file information: File size 4309415 > 1048576
                          Source: LisectAVT_2403002A_482.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3b4200
                          Source: LisectAVT_2403002A_482.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\Win32\Release\Protect32.pdb source: LisectAVT_2403002A_482.exe, 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1269206159.0000000004C02000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.0000000006014000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1328134433.0000000006E50000.00000004.08000000.00040000.00000000.sdmp, Protect544cd51a.dll.0.dr
                          Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000004.00000002.1331873403.0000000003ED5000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: c:\MyProjects\gitlab\ILProtector\ILProtector\Output2010\x64\Release\Protect64.pdb source: LisectAVT_2403002A_482.exe, 00000000.00000002.1328134433.0000000006F0A000.00000004.08000000.00040000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.00000000060D1000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_482.exe, 00000000.00000002.1302733673.0000000005F46000.00000004.00000800.00020000.00000000.sdmp

                          Data Obfuscation

                          barindex
                          Source: LisectAVT_2403002A_482.exe, W4tm6BPxnCpSlBMF6w1.cs.Net Code: Type.GetTypeFromHandle(wDU0EbogyWA7JtKLO1X.oo3HjQ1hqvrBD(16778042)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(wDU0EbogyWA7JtKLO1X.oo3HjQ1hqvrBD(16777323)),Type.GetTypeFromHandle(wDU0EbogyWA7JtKLO1X.oo3HjQ1hqvrBD(16777281))})
                          Source: LisectAVT_2403002A_482.exeStatic PE information: 0x9E8E16EE [Sat Apr 18 08:01:50 2054 UTC]
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E94B6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6E94B6C0
                          Source: LisectAVT_2403002A_482.exeStatic PE information: real checksum: 0x428614 should be: 0x42861b
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E99CC2B push ecx; ret 0_2_6E99CC3E
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E99D565 push ecx; ret 0_2_6E99D578
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_0175573C push es; iretd 0_2_01755742
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4_2_010447F0 push edx; retf 4_2_010447F2
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4_2_010447F3 push edx; retf 4_2_010447F6
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4_2_01044889 push esp; retf 4_2_0104488A
                          Source: LisectAVT_2403002A_482.exe, Wk7omsouO9sW1HSvghQ.csHigh entropy of concatenated method names: 'x0eHjQvz2hFAM', 'dBLveOhkNnJudtMfT1D', 'YnyxONhvjxAs0xYUmFr', 'g0kAXNheTNVa9ZpuJq7', 'PYisQqhhw7WGsdB8maX', 'Vsp5eBhRTnreKKM25Rl', 'WjMeDShWDXSGLrqvk5h'
                          Source: LisectAVT_2403002A_482.exe, iQni2irWV7wBVewwPJ.csHigh entropy of concatenated method names: 'pGvgndBxQ', 'JgdsLGuuY', 'GGnJjiMLS', 'G3DOMUoJO', 'fbdaLexq3', 'MlAf38ddWCPBosvKtI', 'TsBop8qDU30jJe10XG', 'Pr76oU6v4', 'iJ8PDDDnI', 'eGfcfqGIJ'
                          Source: LisectAVT_2403002A_482.exe, ylCXOioY29y90xbXFlu.csHigh entropy of concatenated method names: 'P6Y0TwFLgZ', 'arR0qo9Ew5', 'mO808R9OAa', 'JAr0dY9hUQ', 'jdl0gy7sED', 'bJd0sFmRiB', 'V770Jlhwhm', 'Pos0OZMT3Z', 'Xur0afX2uW', 'qJG06pUotd'
                          Source: LisectAVT_2403002A_482.exe, W4tm6BPxnCpSlBMF6w1.csHigh entropy of concatenated method names: 'dxM0K5n2Ci', 'CTX3QRhu4PI6wBcxhPi', 'fHSkdAnkJf', 'v9H0nQor0h', 'qJG0vcs0uu', 'PFh0N7Qpim', 'w9y0osVsjK', 'otuHjQv1eYUm0', 'dQpS45ErC9', 'ImISjtGC1D'
                          Source: LisectAVT_2403002A_482.exe, bgBWyDP8QoBRBnjm9Z.csHigh entropy of concatenated method names: 'BS1UFMaFd', 'DaW2theb3', 'Equals', 'GetHashCode', 'WrrHv4yDl', 'ToString', 'WaYQm5wWWvJDVQFNnc', 'FGOBNEbF4f6UiYwi1D', 'N1bbkhJS68pnlgAsKN', 'MtNo7rQgIPqSASnfyl'
                          Source: LisectAVT_2403002A_482.exe, Resources.csHigh entropy of concatenated method names: 'VHCUIEMkt354Gv9IMl', 'wd9QZNFV0w7wG0XWrr', 'RnWb5qNgYVHmUEqdKE', 'zn0EW6ouXBKymfynJo', 'B1DKrcpKW723vhPRdC', 'Ddxg7n52r94EYLer4M', 'MM3VZaAjQoEbPJi3pY'
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeFile created: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_482.exe PID: 1664, type: MEMORYSTR
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory allocated: 1710000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory allocated: 32F0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory allocated: 18B0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory allocated: 5D00000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory allocated: 6D00000 memory reserve | memory write watchJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1020000 memory reserve | memory write watchJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 13D0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Protect544cd51a.dllJump to dropped file
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exe TID: 4872Thread sleep time: -30000s >= -30000sJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exe TID: 6956Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4340Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeThread delayed: delay time: 30000Jump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,
                          Source: MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeAPI call chain: ExitProcess graph end nodegraph_0-55963
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E99948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E99948B
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E94B6C0 GetModuleHandleW,GetModuleHandleW,LoadLibraryW,GetProcAddress,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6E94B6C0
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E99948B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6E99948B
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E99B144 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6E99B144
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory allocated: page read and write | page guardJump to behavior

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 42E000Jump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 48A000Jump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: C3B008Jump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeJump to behavior
                          Source: MSBuild.exe, 00000004.00000002.1294504509.00000000030C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                          Source: MSBuild.exe, 00000004.00000002.1294504509.00000000030C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E9984B0 cpuid 0_2_6E9984B0
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_482.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E99A25A GetSystemTimeAsFileTime,__aulldiv,0_2_6E99A25A
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: LisectAVT_2403002A_482.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1257963712.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 4.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.LisectAVT_2403002A_482.exe.4f33660.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.LisectAVT_2403002A_482.exe.4f33660.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.LisectAVT_2403002A_482.exe.4c027d0.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000004.00000002.1286915263.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1269206159.0000000005286000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1269206159.0000000004C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4324, type: MEMORYSTR
                          Source: Yara matchFile source: LisectAVT_2403002A_482.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPE

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: LisectAVT_2403002A_482.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1257963712.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 4.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.LisectAVT_2403002A_482.exe.4f33660.2.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.LisectAVT_2403002A_482.exe.4f33660.2.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0.2.LisectAVT_2403002A_482.exe.4c027d0.3.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000004.00000002.1286915263.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1269206159.0000000005286000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.1269206159.0000000004C02000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4324, type: MEMORYSTR
                          Source: Yara matchFile source: LisectAVT_2403002A_482.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.LisectAVT_2403002A_482.exe.aa0000.0.unpack, type: UNPACKEDPE
                          Source: C:\Users\user\Desktop\LisectAVT_2403002A_482.exeCode function: 0_2_6E94A0C0 CorBindToRuntimeEx,GetModuleHandleW,GetModuleHandleW,__cftoe,GetModuleHandleW,GetProcAddress,0_2_6E94A0C0
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                          Command and Scripting Interpreter
                          1
                          DLL Side-Loading
                          312
                          Process Injection
                          1
                          Masquerading
                          11
                          Input Capture
                          1
                          System Time Discovery
                          Remote Services11
                          Input Capture
                          22
                          Encrypted Channel
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault Accounts1
                          Native API
                          Boot or Logon Initialization Scripts1
                          DLL Side-Loading
                          1
                          Disable or Modify Tools
                          LSASS Memory111
                          Security Software Discovery
                          Remote Desktop Protocol11
                          Archive Collected Data
                          1
                          Non-Application Layer Protocol
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                          Virtualization/Sandbox Evasion
                          Security Account Manager1
                          Process Discovery
                          SMB/Windows Admin SharesData from Network Shared Drive2
                          Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook312
                          Process Injection
                          NTDS31
                          Virtualization/Sandbox Evasion
                          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                          Deobfuscate/Decode Files or Information
                          LSA Secrets23
                          System Information Discovery
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                          Obfuscated Files or Information
                          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                          Software Packing
                          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                          Timestomp
                          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                          DLL Side-Loading
                          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          LisectAVT_2403002A_482.exe100%AviraTR/Kryptik.rwznm
                          LisectAVT_2403002A_482.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
                          https://api.ip.sb/ip0%URL Reputationsafe
                          https://sectigo.com/CPS00%URL Reputationsafe
                          http://ocsp.sectigo.com00%URL Reputationsafe
                          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
                          https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                          https://www.google.com/accounts/o8/.well-known/host-meta?hd=0%Avira URL Cloudsafe
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier0%Avira URL Cloudsafe
                          https://myvidoop.com/0%Avira URL Cloudsafe
                          http://axschema.org/birthDateQhttp://axschema.org/contact/country/homeChttp://axschema.org/contact/e0%Avira URL Cloudsafe
                          https://api.ip.s0%Avira URL Cloudsafe
                          http://www.iana.org/assignments/relation/describedby0%Avira URL Cloudsafe
                          https://me.yahoo.com/Khttps://www.google.com/accounts/o8/id3https://www.myopenid.com/;https://pip.ve0%Avira URL Cloudsafe
                          http://reltype.google.com/openid/xrd-op0%Avira URL Cloudsafe
                          http://specs.openid.net/auth/2.0_Provider0%Avira URL Cloudsafe
                          http://www.idmanagement.gov/schema/2009/05/icam/openid-trust-level1.pdfuhttp://www.idmanagement.gov/0%Avira URL Cloudsafe
                          http://docs.oasis-open.org/xri/xrd/2009/01#canonicalize-raw-octets0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          bg.microsoft.map.fastly.net
                          199.232.210.172
                          truefalse
                            unknown
                            time.windows.com
                            unknown
                            unknownfalse
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tLisectAVT_2403002A_482.exefalse
                              • URL Reputation: safe
                              unknown
                              https://api.ip.sb/ipMSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.com/accounts/o8/.well-known/host-meta?hd=LisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              https://sectigo.com/CPS0LisectAVT_2403002A_482.exefalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.sectigo.com0LisectAVT_2403002A_482.exefalse
                              • URL Reputation: safe
                              unknown
                              http://www.iana.org/assignments/relation/describedbyLisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#LisectAVT_2403002A_482.exefalse
                              • URL Reputation: safe
                              unknown
                              https://me.yahoo.com/Khttps://www.google.com/accounts/o8/id3https://www.myopenid.com/;https://pip.veLisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              https://discord.com/api/v9/users/MSBuild.exe, 00000004.00000002.1294504509.0000000002FCE000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://myvidoop.com/LisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ip.sMSBuild.exe, 00000004.00000002.1294504509.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://reltype.google.com/openid/xrd-opLisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://axschema.org/birthDateQhttp://axschema.org/contact/country/homeChttp://axschema.org/contact/eLisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifierLisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://specs.openid.net/auth/2.0_ProviderLisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.idmanagement.gov/schema/2009/05/icam/openid-trust-level1.pdfuhttp://www.idmanagement.gov/LisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://docs.oasis-open.org/xri/xrd/2009/01#canonicalize-raw-octetsLisectAVT_2403002A_482.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1482213
                              Start date and time:2024-07-25 19:34:48 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 7m 35s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:22
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:LisectAVT_2403002A_482.exe
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@6/3@1/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 97%
                              • Number of executed functions: 116
                              • Number of non-executed functions: 201
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 20.101.57.9, 184.28.90.27, 40.127.169.103, 199.232.210.172, 13.95.31.18, 93.184.221.240, 52.165.164.15
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, twc.trafficmanager.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: LisectAVT_2403002A_482.exe
                              TimeTypeDescription
                              13:35:42API Interceptor1x Sleep call for process: LisectAVT_2403002A_482.exe modified
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              bg.microsoft.map.fastly.nethttps://we.tl/t-RErWU1YgQSGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              https://link.edgepilot.com/s/ffd2b499/yDWVkbNI4U2Q4sOU_SttcQ?u=https://app.smartdraw.com/share.aspx/?pubDocShare=ADCD2AD01498233B06F10716AAA07D9C1E6Get hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              LisectAVT_2403002A_495.dll.dllGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              http://docusign.netGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              LisectAVT_2403002A_80.exeGet hashmaliciousGuLoaderBrowse
                              • 199.232.214.172
                              https://call.imoim.net/CdogBQGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              LisectAVT_2403002B_127.exeGet hashmaliciousBdaejecBrowse
                              • 199.232.210.172
                              LisectAVT_2403002B_203.exeGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              https://forms.office.com/Pages/ResponsePage.aspx?id=2zW8lMsRrkyqi7IHHVNhLgILSZ8nyRhPs0os36GqVFNURElXNEQwRldKWjdYM0cwRERLSFFETE9ERy4uGet hashmaliciousHTMLPhisherBrowse
                              • 199.232.210.172
                              LisectAVT_2403002B_236.exeGet hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\Temp\Protect544cd51a.dll86KZvDaOZR.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                CHA0VZiz8y.exeGet hashmaliciousCryptOne, Djvu, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, VidarBrowse
                                  SecuriteInfo.com.Win64.Evo-gen.30302.14698.exeGet hashmaliciousCryptOne, Djvu, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                    SecuriteInfo.com.Win32.Malware-gen.198.6512.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                      SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                        BI6oo9z4In.exeGet hashmaliciousCryptOne, Djvu, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                          file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                            t0R4HiIJp7.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                              file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                  Process:C:\Users\user\Desktop\LisectAVT_2403002A_482.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):522
                                                  Entropy (8bit):5.358731107079437
                                                  Encrypted:false
                                                  SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLU84qpE4KlKDE4KhKiKhk
                                                  MD5:93E4C46884CB6EE7CDCC4AACE78CDFAC
                                                  SHA1:29B12D9409BA9AFE4C949F02F7D232233C0B5228
                                                  SHA-256:2690023A62F22AB7B27B09351205BA31173B50B77ACA89A5759EDF29A1FB17F7
                                                  SHA-512:E9C3E2FCEE4E13F7776665295A4F6085002913E011BEEF32C8E7065140937DDE1963182B547CC75110BF32AE5130A6686D5862076D5FFED9241F183B9217FA4D
                                                  Malicious:true
                                                  Reputation:moderate, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1119
                                                  Entropy (8bit):5.345080863654519
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                                  MD5:88593431AEF401417595E7A00FE86E5F
                                                  SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                                  SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                                  SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                  Process:C:\Users\user\Desktop\LisectAVT_2403002A_482.exe
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):760320
                                                  Entropy (8bit):6.561572491684602
                                                  Encrypted:false
                                                  SSDEEP:12288:wCMz4nuvURpZ4jR1b2Ag+dQMWCD8iN2+OeO+OeNhBBhhBBgoo+A1AW8JwkaCZ+36:wCs4uvW4jfb2K90oo+C8JwUZc0
                                                  MD5:544CD51A596619B78E9B54B70088307D
                                                  SHA1:4769DDD2DBC1DC44B758964ED0BD231B85880B65
                                                  SHA-256:DFCE2D4D06DE6452998B3C5B2DC33EAA6DB2BD37810D04E3D02DC931887CFDDD
                                                  SHA-512:F56D8B81022BB132D40AA78596DA39B5C212D13B84B5C7D2C576BBF403924F1D22E750DE3B09D1BE30AEA359F1B72C5043B19685FC9BF06D8040BFEE16B17719
                                                  Malicious:false
                                                  Joe Sandbox View:
                                                  • Filename: 86KZvDaOZR.exe, Detection: malicious, Browse
                                                  • Filename: CHA0VZiz8y.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Win64.Evo-gen.30302.14698.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Win32.Malware-gen.198.6512.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Win32.TrojanX-gen.9123.22048.exe, Detection: malicious, Browse
                                                  • Filename: BI6oo9z4In.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: t0R4HiIJp7.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......v...2...2...2...]...6....f..0...)=..,...)=....;...;...2.~.C...)=..i...)=......)=..3...)=..3...Rich2...........PE..L....#da...........!.....(...n...............@......................................(.....@.............................C.......x................................n...B..................................@............@...............................text....&.......(.................. ..`.rdata......@.......,..............@..@.data...`...........................@....rsrc...............................@..@.reloc..R...........................@..B........................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.386031487787678
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                  • Win32 Executable (generic) a (10002005/4) 49.97%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:LisectAVT_2403002A_482.exe
                                                  File size:4'309'415 bytes
                                                  MD5:8121ad7d4b71fae42dd6c4309774c4b7
                                                  SHA1:3ef344fc8aca4cd2d024d5f389e7a7325e2242dc
                                                  SHA256:cf3f993a1f57ff01cc5ba08b79282ece75860c3cfa7ab1339857b51db172cc66
                                                  SHA512:f1a80999bdd2de30faa5265e0004a6c61f66dd43c696ce5a3cd28e4ec31524e9fd8175f56bd05502f7d40188fe6669dda0c1a3c0d881665f5451b9c91cd2fcb5
                                                  SSDEEP:49152:UZpwrL+M9T9fSRvgwJl5FQsSRWZwpx1BcRj0wRUAAV7DW1lDj66Na0BYrM4:UyL9aUsSRCw/1Bc1opVDWvfNaOyM4
                                                  TLSH:7D16BF12F6D4CB12C1EF9676C9F2141817B5EBA79762C31E36AC27B90F537264E83242
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................P..B;..........`;.. ....;...@.. .......................`A.......B...@................................
                                                  Icon Hash:13fb5393db199053
                                                  Entrypoint:0x7b60be
                                                  Entrypoint Section:.text
                                                  Digitally signed:true
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x9E8E16EE [Sat Apr 18 08:01:50 2054 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Signature Valid:
                                                  Signature Issuer:
                                                  Signature Validation Error:
                                                  Error Number:
                                                  Not Before, Not After
                                                    Subject Chain
                                                      Version:
                                                      Thumbprint MD5:
                                                      Thumbprint SHA-1:
                                                      Thumbprint SHA-256:
                                                      Serial:
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3b60700x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b80000x5af98.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x40f6000xcba0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4140000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000x3b40c40x3b4200bbc120952b0a2a35c2a4855fe67c420dunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0x3b80000x5af980x5b000855338dac1e06faeda65c1b75a1dca37False0.3160896720467033data6.473464533290732IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x4140000xc0x2002055cd03711e771291fc4144e793f767False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0x3b93e40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.3914737836561171
                                                      RT_ICON0x3bd60c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.3217053117236484
                                                      RT_ICON0x3cde340xd343PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9967272525562562
                                                      RT_GROUP_ICON0x3db1780x30data0.8541666666666666
                                                      RT_VERSION0x3db1a80x3bcdata0.3912133891213389
                                                      RT_HTML0x3db5640x57d5HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.17513898154325105
                                                      RT_HTML0x3e0d3c0x1921HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3342142079900513
                                                      RT_HTML0x3e26600xaa7HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.39053905390539057
                                                      RT_HTML0x3e31080x60bHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.45701357466063347
                                                      RT_HTML0x3e37140x850HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.43139097744360905
                                                      RT_HTML0x3e3f640x609HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4414239482200647
                                                      RT_HTML0x3e45700x5faHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.44248366013071894
                                                      RT_HTML0x3e4b6c0x98cHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3248772504091653
                                                      RT_HTML0x3e54f80x5a6HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.43084370677731676
                                                      RT_HTML0x3e5aa00xaabHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.40388136213841086
                                                      RT_HTML0x3e654c0x657HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.39063462723351816
                                                      RT_HTML0x3e6ba40xa5fHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.40451977401129946
                                                      RT_HTML0x3e76040x6b0HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4322429906542056
                                                      RT_HTML0x3e7cb40x15f2HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.30758276966892134
                                                      RT_HTML0x3e92a80x7b3HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4140030441400304
                                                      RT_HTML0x3e9a5c0x703eHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.147038351778381
                                                      RT_HTML0x3f0a9c0x6c8HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4274193548387097
                                                      RT_HTML0x3f11640x666HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4365079365079365
                                                      RT_HTML0x3f17cc0x767HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.41055408970976254
                                                      RT_HTML0x3f1f340x852HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4103286384976526
                                                      RT_HTML0x3f27880xb09HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.400353982300885
                                                      RT_HTML0x3f32940x9caHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.41101356743814843
                                                      RT_HTML0x3f3c600xf44HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.38996929375639716
                                                      RT_HTML0x3f4ba40x1badHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3340860973888497
                                                      RT_HTML0x3f67540xecbHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.30895167678901503
                                                      RT_HTML0x3f76200xf84HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3230110775427996
                                                      RT_HTML0x3f85a40xbe9HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3604460478845523
                                                      RT_HTML0x3f91900xc1bHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3607615359793482
                                                      RT_HTML0x3f9dac0xe11HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3140794223826715
                                                      RT_HTML0x3fabc00x1094HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.3124410933081998
                                                      RT_HTML0x3fbc540x4d5HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.44543249797898143
                                                      RT_HTML0x3fc12c0x6f0eHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.14403798804080198
                                                      RT_HTML0x40303c0xca1HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4002474481905351
                                                      RT_HTML0x403ce00x198dHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.332365081791775
                                                      RT_HTML0x4056700x893HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.40865603644646925
                                                      RT_HTML0x405f040x9daHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.39413164155432195
                                                      RT_HTML0x4068e00x6f0eHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.14403798804080198
                                                      RT_HTML0x40d7f00x172dHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.32782740603404686
                                                      RT_HTML0x40ef200x84aHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.410933081998115
                                                      RT_HTML0x40f76c0x8d8HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4218197879858657
                                                      RT_HTML0x4100440xf2cHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.345005149330587
                                                      RT_HTML0x410f700x69eHTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.43506493506493504
                                                      RT_HTML0x4116100x701HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.40936977133296154
                                                      RT_HTML0x411d140x580HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.43110795454545453
                                                      RT_HTML0x4122940x459HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4384546271338724
                                                      RT_HTML0x4126f00x476HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.44833625218914186
                                                      RT_MANIFEST0x412b680x42eXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1010), with CRLF line terminators0.5037383177570094
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                      2024-07-25T19:36:04.889246+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970640.127.169.103192.168.2.7
                                                      2024-07-25T19:36:43.685277+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971040.127.169.103192.168.2.7
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jul 25, 2024 19:35:40.295391083 CEST49674443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:35:40.295414925 CEST49675443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:35:40.357851982 CEST49672443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:35:40.514085054 CEST49671443192.168.2.7204.79.197.203
                                                      Jul 25, 2024 19:35:44.530168056 CEST49677443192.168.2.720.50.201.200
                                                      Jul 25, 2024 19:35:44.904706001 CEST49677443192.168.2.720.50.201.200
                                                      Jul 25, 2024 19:35:45.326679945 CEST49671443192.168.2.7204.79.197.203
                                                      Jul 25, 2024 19:35:45.654716015 CEST49677443192.168.2.720.50.201.200
                                                      Jul 25, 2024 19:35:47.155658960 CEST49677443192.168.2.720.50.201.200
                                                      Jul 25, 2024 19:35:49.967246056 CEST49674443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:35:49.967279911 CEST49675443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:35:50.014130116 CEST49672443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:35:50.154778004 CEST49677443192.168.2.720.50.201.200
                                                      Jul 25, 2024 19:35:52.408023119 CEST44349699104.98.116.138192.168.2.7
                                                      Jul 25, 2024 19:35:52.408932924 CEST49699443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:35:55.018215895 CEST49671443192.168.2.7204.79.197.203
                                                      Jul 25, 2024 19:35:56.105889082 CEST49677443192.168.2.720.50.201.200
                                                      Jul 25, 2024 19:36:01.326742887 CEST49699443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:36:01.327512026 CEST49705443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:36:01.327543974 CEST44349705104.98.116.138192.168.2.7
                                                      Jul 25, 2024 19:36:01.327636957 CEST49705443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:36:01.330766916 CEST49705443192.168.2.7104.98.116.138
                                                      Jul 25, 2024 19:36:01.330780029 CEST44349705104.98.116.138192.168.2.7
                                                      Jul 25, 2024 19:36:01.331645012 CEST44349699104.98.116.138192.168.2.7
                                                      Jul 25, 2024 19:36:08.021456957 CEST49677443192.168.2.720.50.201.200
                                                      Jul 25, 2024 19:36:44.082539082 CEST44349705104.98.116.138192.168.2.7
                                                      Jul 25, 2024 19:36:44.082664967 CEST49705443192.168.2.7104.98.116.138
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jul 25, 2024 19:35:50.364857912 CEST5330453192.168.2.71.1.1.1
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jul 25, 2024 19:35:50.364857912 CEST192.168.2.71.1.1.10x1174Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jul 25, 2024 19:35:50.373223066 CEST1.1.1.1192.168.2.70x1174No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                      Jul 25, 2024 19:36:02.741749048 CEST1.1.1.1192.168.2.70x4cd9No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                      Jul 25, 2024 19:36:02.741749048 CEST1.1.1.1192.168.2.70x4cd9No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:13:35:42
                                                      Start date:25/07/2024
                                                      Path:C:\Users\user\Desktop\LisectAVT_2403002A_482.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_482.exe"
                                                      Imagebase:0xaa0000
                                                      File size:4'309'415 bytes
                                                      MD5 hash:8121AD7D4B71FAE42DD6C4309774C4B7
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1269206159.0000000005286000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1269206159.0000000004C02000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000000.1257963712.0000000000AA2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:13:35:43
                                                      Start date:25/07/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                                      Imagebase:0x2d0000
                                                      File size:262'432 bytes
                                                      MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:13:35:43
                                                      Start date:25/07/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                                      Imagebase:0x9d0000
                                                      File size:262'432 bytes
                                                      MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000002.1286915263.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:13:35:43
                                                      Start date:25/07/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff75da10000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:7.7%
                                                        Dynamic/Decrypted Code Coverage:3.3%
                                                        Signature Coverage:5.3%
                                                        Total number of Nodes:1230
                                                        Total number of Limit Nodes:17
                                                        execution_graph 55642 3299b68 55643 3299be6 CreateProcessA 55642->55643 55645 3299e4c 55643->55645 55646 329a168 55647 329a1b0 VirtualAllocEx 55646->55647 55648 329a226 55647->55648 55649 329a068 55650 329a0b0 Wow64SetThreadContext 55649->55650 55651 329a105 55650->55651 57002 329a288 57003 329a2d0 TerminateProcess 57002->57003 57004 329a323 57003->57004 55652 6e959357 55653 6e959368 55652->55653 55789 6e9569c0 55653->55789 55655 6e95ae62 SafeArrayDestroy 55656 6e95ae68 55655->55656 55658 6e95ae72 SafeArrayDestroy 55656->55658 55659 6e95ae7b 55656->55659 55657 6e9593ac 55662 6e9569c0 11 API calls 55657->55662 55710 6e958739 55657->55710 55658->55659 55660 6e95ae85 SafeArrayDestroy 55659->55660 55661 6e95ae8e 55659->55661 55660->55661 55663 6e95aea1 55661->55663 55664 6e95ae98 SafeArrayDestroy 55661->55664 55671 6e95943a 55662->55671 55665 6e95aeb4 55663->55665 55666 6e95aeab SafeArrayDestroy 55663->55666 55664->55663 55667 6e95aec7 55665->55667 55668 6e95aebe SafeArrayDestroy 55665->55668 55666->55665 55879 6e99948b 55667->55879 55668->55667 55670 6e95aef5 55672 6e9594b1 SafeArrayGetLBound SafeArrayGetUBound 55671->55672 55671->55710 55673 6e959658 55672->55673 55678 6e9594ef 55672->55678 55796 6e94d920 55673->55796 55675 6e9594fd SafeArrayGetElement 55675->55678 55675->55710 55676 6e95840e 55676->55710 55845 6e94dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 55676->55845 55678->55673 55678->55675 55678->55676 55678->55710 55679 6e958441 55680 6e9584af SafeArrayGetLBound SafeArrayGetUBound 55679->55680 55679->55710 55681 6e958616 55680->55681 55682 6e9584ed SafeArrayGetElement 55680->55682 55846 6e94dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 55681->55846 55692 6e958518 55682->55692 55682->55710 55684 6e95862b 55684->55710 55847 6e94dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 55684->55847 55685 6e95968f 55689 6e959794 SafeArrayGetLBound SafeArrayGetUBound 55685->55689 55685->55710 55687 6e95864b 55687->55710 55848 6e94dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 55687->55848 55688 6e953a90 8 API calls 55688->55692 55699 6e959c5e 55689->55699 55716 6e9597d2 55689->55716 55691 6e95866b 55691->55710 55849 6e94dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 55691->55849 55692->55681 55692->55682 55692->55688 55693 6e9597e3 SafeArrayGetElement 55693->55710 55693->55716 55695 6e94d920 3 API calls 55701 6e959cf8 55695->55701 55696 6e95868a 55696->55710 55850 6e94dfb0 SafeArrayGetLBound SafeArrayGetUBound SafeArrayGetElement 55696->55850 55698 6e9586aa 55700 6e9569c0 11 API calls 55698->55700 55698->55710 55699->55695 55702 6e9586cf 55700->55702 55705 6e959d4f SafeArrayGetLBound SafeArrayGetUBound 55701->55705 55701->55710 55703 6e9569c0 11 API calls 55702->55703 55702->55710 55704 6e9586f5 55703->55704 55707 6e9569c0 11 API calls 55704->55707 55704->55710 55706 6e959ec7 55705->55706 55715 6e959d8d 55705->55715 55709 6e94d920 3 API calls 55706->55709 55707->55710 55708 6e959da0 SafeArrayGetElement 55708->55710 55708->55715 55711 6e959f09 55709->55711 55710->55655 55710->55656 55711->55710 55714 6e94d920 3 API calls 55711->55714 55712 6e953a90 8 API calls 55712->55716 55713 6e953a90 8 API calls 55713->55715 55717 6e959f8b 55714->55717 55715->55706 55715->55708 55715->55713 55716->55676 55716->55693 55716->55699 55716->55712 55717->55710 55718 6e94d920 3 API calls 55717->55718 55719 6e95a01f 55718->55719 55719->55710 55720 6e94d920 3 API calls 55719->55720 55721 6e95a09b 55720->55721 55721->55710 55722 6e95a1ac SafeArrayGetLBound SafeArrayGetUBound 55721->55722 55723 6e95a7b3 55722->55723 55738 6e95a1ea 55722->55738 55724 6e94d920 3 API calls 55723->55724 55726 6e95a7ce 55724->55726 55725 6e95a1fd SafeArrayGetElement 55728 6e95a815 55725->55728 55725->55738 55726->55710 55727 6e94d920 3 API calls 55726->55727 55727->55728 55728->55710 55804 6e9564d0 VariantInit VariantInit VariantInit SafeArrayCreateVector 55728->55804 55729 6e953a90 8 API calls 55729->55738 55731 6e95a91d 55731->55710 55732 6e9564d0 109 API calls 55731->55732 55733 6e95a950 55732->55733 55733->55710 55734 6e9564d0 109 API calls 55733->55734 55735 6e95a983 55734->55735 55735->55710 55736 6e9564d0 109 API calls 55735->55736 55737 6e95a9b6 55736->55737 55737->55710 55739 6e9564d0 109 API calls 55737->55739 55738->55723 55738->55725 55738->55729 55740 6e95a9e9 55739->55740 55740->55710 55741 6e9564d0 109 API calls 55740->55741 55742 6e95aa1c 55741->55742 55742->55710 55743 6e9564d0 109 API calls 55742->55743 55744 6e95aa4f 55743->55744 55744->55710 55745 6e9564d0 109 API calls 55744->55745 55746 6e95aa82 55745->55746 55746->55710 55747 6e9564d0 109 API calls 55746->55747 55748 6e95aab5 55747->55748 55748->55710 55749 6e9564d0 109 API calls 55748->55749 55750 6e95aae8 55749->55750 55750->55710 55751 6e9564d0 109 API calls 55750->55751 55752 6e95ab1e 55751->55752 55752->55710 55753 6e95abd0 55752->55753 55757 6e95ac5a 55752->55757 55818 6e952970 55753->55818 55851 6e95d790 77 API calls 3 library calls 55757->55851 55759 6e95ac37 55759->55710 55852 6e941690 77 API calls 55759->55852 55761 6e95ad36 55853 6e9450c0 77 API calls 55761->55853 55763 6e95ad4d 55854 6e999bb5 55763->55854 55767 6e95ad77 55874 6e9450c0 77 API calls 55767->55874 55769 6e95ad82 55770 6e999bb5 77 API calls 55769->55770 55771 6e95ad89 55770->55771 55772 6e945050 77 API calls 55771->55772 55773 6e95ada7 55772->55773 55774 6e999bb5 77 API calls 55773->55774 55775 6e95adae 55774->55775 55776 6e945050 77 API calls 55775->55776 55777 6e95adcc 55776->55777 55875 6e9450c0 77 API calls 55777->55875 55779 6e95add7 55780 6e999bb5 77 API calls 55779->55780 55781 6e95ade1 55780->55781 55782 6e945050 77 API calls 55781->55782 55783 6e95adfb 55782->55783 55876 6e9450c0 77 API calls 55783->55876 55785 6e95ae06 55877 6e9450c0 77 API calls 55785->55877 55787 6e95ae11 55878 6e942a40 340 API calls 55787->55878 55790 6e956a01 SafeArrayGetLBound SafeArrayGetUBound 55789->55790 55791 6e9569f3 55789->55791 55793 6e956a92 55790->55793 55795 6e956a2a 55790->55795 55791->55790 55792 6e956a30 SafeArrayGetElement 55792->55793 55792->55795 55793->55657 55795->55792 55795->55793 55887 6e953990 8 API calls 55795->55887 55797 6e94d944 SafeArrayCreateVector 55796->55797 55798 6e94d936 55796->55798 55799 6e94d981 55797->55799 55801 6e94d95a 55797->55801 55798->55797 55802 6e94d9d5 55799->55802 55803 6e94d9ce SafeArrayDestroy 55799->55803 55800 6e94d960 SafeArrayPutElement 55800->55799 55800->55801 55801->55799 55801->55800 55802->55685 55803->55802 55805 6e956554 55804->55805 55806 6e95655c SafeArrayPutElement VariantClear 55804->55806 55805->55806 55807 6e956584 SafeArrayPutElement VariantClear 55806->55807 55817 6e956655 55806->55817 55811 6e9565cd 55807->55811 55807->55817 55809 6e956665 SafeArrayDestroy 55810 6e95666c VariantClear VariantClear VariantClear 55809->55810 55810->55731 55811->55817 55888 6e94db30 VariantInit SafeArrayCreateVector SafeArrayPutElement 55811->55888 55813 6e95663a 55813->55817 55892 6e9556b0 55813->55892 55817->55809 55817->55810 55828 6e9529c3 55818->55828 55819 6e952d21 55819->55710 55832 6e95d2e0 55819->55832 55820 6e952d1a SafeArrayDestroy 55820->55819 55821 6e9529ee SafeArrayGetLBound SafeArrayGetUBound 55822 6e952a20 SafeArrayGetElement 55821->55822 55826 6e952c53 55821->55826 55822->55826 55822->55828 55823 6e952ab6 VariantInit 55823->55828 55824 6e952c8b VariantClear VariantClear 55824->55826 55825 6e952b3a VariantInit 55825->55828 55826->55819 55826->55820 55827 6e952d3a VariantClear VariantClear VariantClear 55827->55826 55828->55819 55828->55821 55828->55822 55828->55823 55828->55824 55828->55825 55828->55826 55828->55827 55829 6e952cb6 VariantClear VariantClear VariantClear 55828->55829 55830 6e952bf9 VariantClear VariantClear VariantClear 55828->55830 55829->55826 55830->55828 55833 6e999bb5 77 API calls 55832->55833 55834 6e95d32f 55833->55834 55835 6e95d3db 55834->55835 55837 6e95d33e 55834->55837 55921 6e999533 66 API calls std::exception::_Copy_str 55835->55921 55910 6e95c530 VariantInit VariantInit SafeArrayCreateVector 55837->55910 55838 6e95d3ed 55922 6e99ac75 RaiseException 55838->55922 55840 6e95d404 55843 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 55844 6e95d3d5 55843->55844 55844->55759 55845->55679 55846->55684 55847->55687 55848->55691 55849->55696 55850->55698 55851->55759 55852->55761 55853->55763 55857 6e999bbf 55854->55857 55855 6e999d66 _malloc 66 API calls 55855->55857 55856 6e95ad5d 55866 6e945050 55856->55866 55857->55855 55857->55856 55861 6e999bdb std::exception::exception 55857->55861 55969 6e99c86e DecodePointer 55857->55969 55860 6e999c23 55972 6e99ac75 RaiseException 55860->55972 55865 6e999c19 55861->55865 55970 6e999af4 76 API calls __cinit 55861->55970 55864 6e999c34 55971 6e9995c1 66 API calls std::exception::operator= 55865->55971 55867 6e945091 55866->55867 55868 6e94505d 55866->55868 55869 6e94509d 55867->55869 55974 6e945110 77 API calls std::_Xinvalid_argument 55867->55974 55868->55867 55871 6e945066 55868->55871 55869->55767 55872 6e94507a 55871->55872 55973 6e945110 77 API calls std::_Xinvalid_argument 55871->55973 55872->55767 55874->55769 55875->55779 55876->55785 55877->55787 55878->55710 55880 6e999493 55879->55880 55881 6e999495 IsDebuggerPresent 55879->55881 55880->55670 55975 6e9a0036 55881->55975 55884 6e99ce7e SetUnhandledExceptionFilter UnhandledExceptionFilter 55885 6e99cea3 GetCurrentProcess TerminateProcess 55884->55885 55886 6e99ce9b __call_reportfault 55884->55886 55885->55670 55886->55885 55887->55795 55889 6e94db8c 55888->55889 55890 6e94dbf7 VariantClear 55889->55890 55891 6e94dbf0 SafeArrayDestroy 55889->55891 55890->55813 55891->55890 55893 6e9556e0 55892->55893 55898 6e9556f4 55892->55898 55893->55898 55907 6e9557c0 81 API calls std::_Xinvalid_argument 55893->55907 55896 6e955744 55899 6e956880 VariantInit VariantInit 55896->55899 55897 6e95570d VariantInit VariantCopy 55897->55896 55897->55898 55898->55896 55898->55897 55908 6e9557c0 81 API calls std::_Xinvalid_argument 55898->55908 55909 6e9991e1 55899->55909 55901 6e9568cd SafeArrayCreateVector SafeArrayPutElement VariantClear 55902 6e956913 SafeArrayPutElement 55901->55902 55903 6e95692d 55901->55903 55902->55903 55904 6e956987 55903->55904 55905 6e956980 SafeArrayDestroy 55903->55905 55906 6e956994 VariantClear VariantClear 55904->55906 55905->55904 55906->55817 55907->55898 55908->55898 55911 6e95c5a4 55910->55911 55912 6e95c5ac SafeArrayPutElement VariantClear 55910->55912 55911->55912 55913 6e95c7e4 55912->55913 55917 6e95c5cf 55912->55917 55914 6e95c7f7 VariantClear VariantClear 55913->55914 55915 6e95c7f0 SafeArrayDestroy 55913->55915 55916 6e95c817 55914->55916 55915->55914 55916->55843 55917->55913 55918 6e95c7d9 55917->55918 55926 6e99919e 67 API calls 3 library calls 55917->55926 55923 6e95df70 55918->55923 55921->55838 55922->55840 55927 6e95d410 55923->55927 55925 6e95df80 55925->55913 55926->55918 55928 6e95d472 VariantInit VariantInit VariantInit 55927->55928 55929 6e95d44e 55927->55929 55930 6e95d470 _memmove 55928->55930 55929->55925 55930->55928 55931 6e95d704 VariantClear VariantClear VariantClear 55930->55931 55933 6e95d75d 55930->55933 55934 6e95d579 SafeArrayCreateVector SafeArrayCreateVector SafeArrayAccessData 55930->55934 55935 6e95d5ec SafeArrayPutElement 55930->55935 55936 6e95d5d6 SafeArrayUnaccessData 55930->55936 55937 6e95d633 SafeArrayPutElement VariantClear 55930->55937 55939 6e95d6fa SafeArrayDestroy 55930->55939 55940 6e94db30 5 API calls 55930->55940 55941 6e9556b0 83 API calls 55930->55941 55942 6e956880 9 API calls 55930->55942 55943 6e999d66 55930->55943 55960 6e999d2c 66 API calls __dosmaperr 55930->55960 55931->55930 55931->55933 55933->55925 55934->55930 55935->55930 55936->55935 55937->55930 55939->55930 55940->55930 55941->55930 55942->55930 55944 6e999de3 55943->55944 55950 6e999d74 55943->55950 55967 6e99c86e DecodePointer 55944->55967 55946 6e999de9 55968 6e99d7d8 66 API calls __getptd_noexit 55946->55968 55949 6e999da2 RtlAllocateHeap 55949->55950 55959 6e999ddb 55949->55959 55950->55949 55952 6e999dcf 55950->55952 55953 6e999d7f 55950->55953 55957 6e999dcd 55950->55957 55964 6e99c86e DecodePointer 55950->55964 55965 6e99d7d8 66 API calls __getptd_noexit 55952->55965 55953->55950 55961 6e99d74e 66 API calls 2 library calls 55953->55961 55962 6e99d59f 66 API calls 7 library calls 55953->55962 55963 6e99d279 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 55953->55963 55966 6e99d7d8 66 API calls __getptd_noexit 55957->55966 55959->55930 55960->55930 55961->55953 55962->55953 55964->55950 55965->55957 55966->55959 55967->55946 55968->55959 55969->55857 55970->55865 55971->55860 55972->55864 55973->55872 55974->55869 55975->55884 55976 329a360 55977 329a3b0 WriteProcessMemory 55976->55977 55979 329a447 55977->55979 55980 32997e0 55981 329984b 55980->55981 55984 6e963eb0 55981->55984 55982 3299874 55985 6e999bb5 77 API calls 55984->55985 55986 6e963f11 55985->55986 55987 6e999bb5 77 API calls 55986->55987 55988 6e963f36 55987->55988 55989 6e945050 77 API calls 55988->55989 55990 6e963f50 55989->55990 55991 6e999bb5 77 API calls 55990->55991 55992 6e963f57 55991->55992 55993 6e945050 77 API calls 55992->55993 55994 6e963f71 55993->55994 55995 6e999bb5 77 API calls 55994->55995 55996 6e963f78 55995->55996 55997 6e945050 77 API calls 55996->55997 55998 6e963f92 55997->55998 55999 6e999bb5 77 API calls 55998->55999 56000 6e963fab 55999->56000 56001 6e963fb2 56000->56001 56002 6e964031 56000->56002 56025 6e9416b0 56001->56025 56089 6e999533 66 API calls std::exception::_Copy_str 56002->56089 56005 6e964047 56090 6e99ac75 RaiseException 56005->56090 56007 6e96405e 56008 6e999bb5 77 API calls 56007->56008 56010 6e9640b5 56008->56010 56009 6e963fdc moneypunct 56009->55982 56011 6e999bb5 77 API calls 56010->56011 56012 6e9640d8 56011->56012 56013 6e945050 77 API calls 56012->56013 56014 6e9640f2 56013->56014 56015 6e999bb5 77 API calls 56014->56015 56016 6e9640f9 56015->56016 56017 6e945050 77 API calls 56016->56017 56018 6e964113 56017->56018 56019 6e999bb5 77 API calls 56018->56019 56020 6e96411a 56019->56020 56021 6e945050 77 API calls 56020->56021 56022 6e964134 56021->56022 56023 6e9416b0 340 API calls 56022->56023 56024 6e964169 moneypunct 56023->56024 56024->55982 56026 6e999bb5 77 API calls 56025->56026 56027 6e941706 56026->56027 56028 6e941711 56027->56028 56029 6e941c39 56027->56029 56091 6e942d70 56028->56091 56143 6e999533 66 API calls std::exception::_Copy_str 56029->56143 56033 6e941c48 56144 6e99ac75 RaiseException 56033->56144 56035 6e941c5d 56036 6e942d70 77 API calls 56037 6e941788 56036->56037 56038 6e942d70 77 API calls 56037->56038 56039 6e9417a9 56038->56039 56040 6e942d70 77 API calls 56039->56040 56041 6e9417ca 56040->56041 56042 6e942d70 77 API calls 56041->56042 56043 6e9417e6 56042->56043 56044 6e942d70 77 API calls 56043->56044 56045 6e94182f 56044->56045 56046 6e942d70 77 API calls 56045->56046 56047 6e941878 56046->56047 56048 6e942d70 77 API calls 56047->56048 56049 6e9418c6 56048->56049 56050 6e942d70 77 API calls 56049->56050 56051 6e9418e7 56050->56051 56052 6e942d70 77 API calls 56051->56052 56053 6e941900 56052->56053 56054 6e942d70 77 API calls 56053->56054 56055 6e941946 56054->56055 56056 6e942d70 77 API calls 56055->56056 56057 6e94198f 56056->56057 56058 6e942d70 77 API calls 56057->56058 56059 6e9419d3 56058->56059 56060 6e942d70 77 API calls 56059->56060 56061 6e941a05 56060->56061 56099 6e943b30 56061->56099 56064 6e942d70 77 API calls 56065 6e941a21 56064->56065 56066 6e942d70 77 API calls 56065->56066 56067 6e941a82 56066->56067 56108 6e943bd0 56067->56108 56070 6e942d70 77 API calls 56071 6e941a9e 56070->56071 56072 6e942d70 77 API calls 56071->56072 56073 6e941aec 56072->56073 56117 6e942a80 56073->56117 56075 6e941b4c 56077 6e941b62 56075->56077 56140 6e99919e 67 API calls 3 library calls 56075->56140 56076 6e941b58 56141 6e999125 67 API calls 2 library calls 56076->56141 56123 6e946850 56077->56123 56127 6e9630c0 56077->56127 56131 6e9642e0 56077->56131 56135 6e9469e0 56077->56135 56081 6e941b00 56081->56075 56081->56076 56082 6e941b6d moneypunct 56081->56082 56139 6e942e60 77 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 56081->56139 56142 6e943530 67 API calls 56082->56142 56084 6e941ba1 moneypunct 56084->56009 56089->56005 56090->56007 56095 6e942db8 56091->56095 56093 6e942e02 56146 6e943cc0 67 API calls 56093->56146 56094 6e942e0d 56097 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56094->56097 56095->56094 56145 6e935a30 77 API calls 2 library calls 56095->56145 56098 6e941746 56097->56098 56098->56036 56100 6e943b3d 56099->56100 56101 6e999bb5 77 API calls 56100->56101 56102 6e943b6f 56101->56102 56103 6e941a0c 56102->56103 56147 6e999533 66 API calls std::exception::_Copy_str 56102->56147 56103->56064 56105 6e943bae 56148 6e99ac75 RaiseException 56105->56148 56107 6e943bc3 56109 6e943bdd 56108->56109 56110 6e999bb5 77 API calls 56109->56110 56112 6e943c0f 56110->56112 56111 6e941a89 56111->56070 56112->56111 56149 6e999533 66 API calls std::exception::_Copy_str 56112->56149 56114 6e943c4e 56150 6e99ac75 RaiseException 56114->56150 56116 6e943c63 56118 6e942acd 56117->56118 56122 6e942ae6 56117->56122 56119 6e942adf 56118->56119 56151 6e9990d8 67 API calls 2 library calls 56118->56151 56152 6e9431e0 77 API calls 2 library calls 56119->56152 56122->56081 56124 6e946890 56123->56124 56125 6e94686e 56123->56125 56124->56082 56153 6e948bc0 56125->56153 56128 6e9630de 56127->56128 56129 6e9630f8 56127->56129 56512 6e945fa0 56128->56512 56129->56082 56132 6e96431d 56131->56132 56133 6e9642fe 56131->56133 56132->56082 56533 6e9462c0 56133->56533 56136 6e946a1f 56135->56136 56137 6e9469fe 56135->56137 56136->56082 56560 6e949110 56137->56560 56139->56081 56140->56076 56141->56077 56142->56084 56143->56033 56144->56035 56145->56093 56146->56094 56147->56105 56148->56107 56149->56114 56150->56116 56151->56119 56152->56122 56154 6e948bd5 EnterCriticalSection 56153->56154 56155 6e948bcc 56153->56155 56163 6e95e030 56154->56163 56155->56124 56159 6e948c13 LeaveCriticalSection 56159->56124 56164 6e95e090 56163->56164 56165 6e95e05d 56163->56165 56167 6e999bb5 77 API calls 56164->56167 56166 6e948bec 56165->56166 56168 6e999bb5 77 API calls 56165->56168 56169 6e94b6c0 GetModuleHandleW 56166->56169 56167->56166 56168->56166 56170 6e94b717 LoadLibraryW 56169->56170 56171 6e94b72a GetProcAddress 56169->56171 56170->56171 56172 6e94b94c 56170->56172 56171->56172 56175 6e94b73e 56171->56175 56173 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56172->56173 56174 6e948bfa 56173->56174 56174->56159 56182 6e948c40 56174->56182 56175->56172 56176 6e94b85d 56175->56176 56196 6e99a116 80 API calls __mbstowcs_s_l 56176->56196 56178 6e94b875 GetModuleHandleW 56178->56172 56179 6e94b8aa GetProcAddress 56178->56179 56179->56172 56181 6e94b8f2 56179->56181 56181->56172 56197 6e94a350 VariantInit VariantInit VariantInit 56182->56197 56183 6e948cf9 56183->56159 56184 6e948c63 56184->56183 56207 6e948b10 EnterCriticalSection 56184->56207 56186 6e948c83 56187 6e948ce2 56186->56187 56188 6e948c9f 56186->56188 56216 6e94b9a0 56186->56216 56187->56159 56224 6e94bab0 56188->56224 56191 6e948cd3 56191->56187 56240 6e948ff0 69 API calls std::tr1::_Xweak 56191->56240 56196->56178 56201 6e94a3b5 56197->56201 56198 6e94a505 VariantClear VariantClear VariantClear 56199 6e94a52a 56198->56199 56199->56184 56200 6e94a3e0 VariantCopy 56202 6e94a3ff VariantClear 56200->56202 56203 6e94a3f9 56200->56203 56201->56198 56201->56200 56204 6e94a413 56202->56204 56203->56202 56204->56198 56205 6e94a549 VariantClear VariantClear VariantClear 56204->56205 56206 6e94a57a 56205->56206 56206->56184 56208 6e948b4b 56207->56208 56210 6e999bb5 77 API calls 56208->56210 56215 6e948b53 LeaveCriticalSection 56208->56215 56211 6e948b64 56210->56211 56212 6e948b80 56211->56212 56241 6e947370 79 API calls 2 library calls 56211->56241 56242 6e9496d0 77 API calls 56212->56242 56215->56186 56217 6e94b9dc 56216->56217 56218 6e999bb5 77 API calls 56217->56218 56223 6e94ba7a 56217->56223 56219 6e94ba3a 56218->56219 56220 6e94ba6a 56219->56220 56287 6e955f00 77 API calls 2 library calls 56219->56287 56243 6e956fd0 56220->56243 56223->56188 56304 6e95b580 56224->56304 56226 6e94baf3 56230 6e948cbd 56226->56230 56309 6e94af30 VariantInit VariantInit VariantInit 56226->56309 56228 6e94bb0d 56229 6e999bb5 77 API calls 56228->56229 56228->56230 56229->56230 56230->56187 56231 6e948d60 EnterCriticalSection 56230->56231 56330 6e949750 56231->56330 56234 6e948e0a 56234->56191 56235 6e948d97 56235->56234 56236 6e948de5 56235->56236 56332 6e94bdf7 56235->56332 56342 6e948e20 56236->56342 56238 6e948e02 56238->56191 56240->56187 56241->56212 56242->56215 56246 6e95700a 56243->56246 56260 6e9578c2 56243->56260 56244 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56245 6e958326 56244->56245 56245->56223 56247 6e94d920 3 API calls 56246->56247 56246->56260 56248 6e9578b5 56247->56248 56249 6e94d920 3 API calls 56248->56249 56248->56260 56250 6e957920 56249->56250 56251 6e94d920 3 API calls 56250->56251 56250->56260 56252 6e957986 56251->56252 56253 6e94d920 3 API calls 56252->56253 56254 6e9579df 56252->56254 56253->56254 56254->56260 56288 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56254->56288 56256 6e957a7b 56256->56260 56289 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56256->56289 56258 6e957acb 56258->56260 56290 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56258->56290 56260->56244 56261 6e957b19 56261->56260 56291 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56261->56291 56263 6e957b90 56263->56260 56292 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56263->56292 56265 6e957c0b 56265->56260 56293 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56265->56293 56267 6e957ca5 56267->56260 56294 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56267->56294 56269 6e957d3f 56269->56260 56295 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56269->56295 56271 6e957dbb 56271->56260 56296 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56271->56296 56273 6e957e44 56273->56260 56297 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56273->56297 56275 6e957eb5 56275->56260 56298 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56275->56298 56277 6e957f6e 56277->56260 56299 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56277->56299 56279 6e958081 56279->56260 56300 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56279->56300 56281 6e9580ca 56281->56260 56301 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56281->56301 56283 6e9580f9 56283->56260 56302 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56283->56302 56285 6e958175 56285->56260 56303 6e94d9f0 SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy 56285->56303 56287->56220 56288->56256 56289->56258 56290->56261 56291->56263 56292->56265 56293->56267 56294->56269 56295->56271 56296->56273 56297->56275 56298->56277 56299->56279 56300->56281 56301->56283 56302->56285 56303->56260 56305 6e95b5b5 56304->56305 56306 6e95b5cb VariantInit VariantInit 56304->56306 56305->56226 56308 6e95b5ee 56306->56308 56307 6e95b675 VariantClear VariantClear 56307->56226 56308->56307 56312 6e94af97 56309->56312 56310 6e94b22c VariantClear VariantClear VariantClear 56311 6e94b254 56310->56311 56311->56228 56312->56310 56313 6e94affe VariantCopy 56312->56313 56314 6e94b017 56313->56314 56315 6e94b01d VariantClear 56313->56315 56314->56315 56316 6e94b035 56315->56316 56316->56310 56317 6e999bb5 77 API calls 56316->56317 56318 6e94b0ae 56317->56318 56329 6e99a136 66 API calls 2 library calls 56318->56329 56320 6e94b108 56321 6e94b190 SafeArrayGetLBound SafeArrayGetUBound 56320->56321 56322 6e94b28d VariantClear VariantClear VariantClear 56320->56322 56326 6e94b1fd moneypunct 56320->56326 56324 6e94b1bf SafeArrayAccessData 56321->56324 56325 6e94b28b 56321->56325 56323 6e94b2ba 56322->56323 56323->56228 56324->56325 56327 6e94b1d3 _memmove 56324->56327 56325->56322 56326->56310 56328 6e94b1eb SafeArrayUnaccessData 56327->56328 56328->56325 56328->56326 56329->56320 56331 6e948d88 LeaveCriticalSection 56330->56331 56331->56234 56331->56235 56333 6e94be01 56332->56333 56334 6e94be2c SafeArrayDestroy 56333->56334 56335 6e94be33 56333->56335 56334->56335 56338 6e94be6a IsBadReadPtr 56335->56338 56340 6e94be77 56335->56340 56341 6e94befd moneypunct 56335->56341 56336 6e94af30 92 API calls 56336->56341 56337 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56339 6e94c00f 56337->56339 56338->56340 56339->56236 56340->56336 56341->56337 56343 6e948e39 56342->56343 56344 6e948e7c EnterCriticalSection 56343->56344 56346 6e948f7f moneypunct 56343->56346 56345 6e948e9e 56344->56345 56347 6e948eac LeaveCriticalSection 56345->56347 56346->56238 56347->56346 56348 6e948ebd 56347->56348 56349 6e999bb5 77 API calls 56348->56349 56350 6e948ec4 _memset 56349->56350 56352 6e94c020 VariantInit VariantInit VariantInit VariantInit 56350->56352 56355 6e94c098 56352->56355 56353 6e94c307 VariantClear VariantClear VariantClear VariantClear 56354 6e94c336 56353->56354 56354->56346 56355->56353 56360 6e94b300 56355->56360 56358 6e94c234 56358->56353 56359 6e94c10c 56359->56353 56359->56358 56371 6e95b6b0 VariantInit VariantInit 56359->56371 56369 6e94b364 56360->56369 56361 6e94b524 SafeArrayDestroy 56362 6e94b52e 56361->56362 56363 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56362->56363 56364 6e94b5a1 56363->56364 56364->56359 56365 6e94b3e1 SafeArrayGetLBound SafeArrayGetUBound 56367 6e94b4be 56365->56367 56365->56369 56366 6e94b416 SafeArrayGetElement 56366->56369 56370 6e94b3c8 56366->56370 56368 6e94b5d8 VariantClear 56367->56368 56367->56370 56368->56370 56369->56365 56369->56366 56369->56367 56369->56370 56370->56361 56370->56362 56372 6e95b75a 56371->56372 56373 6e95be96 VariantClear VariantClear 56372->56373 56374 6e95b7b9 SafeArrayCreateVector 56372->56374 56375 6e95beb6 56373->56375 56376 6e95b7e4 56374->56376 56377 6e95b7ec SafeArrayPutElement VariantClear 56374->56377 56378 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56375->56378 56376->56377 56381 6e95b80f 56377->56381 56428 6e95b8fa 56377->56428 56379 6e95beef 56378->56379 56379->56358 56380 6e95be8f SafeArrayDestroy 56380->56373 56382 6e95b871 56381->56382 56383 6e95b913 56381->56383 56381->56428 56382->56428 56430 6e95dbc0 56382->56430 56383->56428 56507 6e94dcd0 10 API calls 56383->56507 56386 6e95b93f 56386->56428 56508 6e94dcd0 10 API calls 56386->56508 56387 6e95b8d3 56438 6e95c850 VariantInit VariantInit SafeArrayCreateVector 56387->56438 56389 6e95b962 56391 6e95b8ef 56389->56391 56389->56428 56509 6e94dcd0 10 API calls 56389->56509 56393 6e95ba0b VariantClear 56391->56393 56391->56428 56394 6e95ba23 56393->56394 56393->56428 56395 6e999bb5 77 API calls 56394->56395 56394->56428 56396 6e95baa2 56395->56396 56449 6e95bf00 VariantInit VariantInit VariantInit VariantInit 56396->56449 56399 6e95baeb 56401 6e95bb09 56399->56401 56399->56428 56511 6e9547d0 107 API calls 56399->56511 56401->56428 56466 6e9549b0 VariantInit VariantInit VariantInit SafeArrayCreateVector 56401->56466 56404 6e95bb2c 56404->56428 56478 6e95cd20 VariantInit VariantInit VariantInit SafeArrayCreateVector 56404->56478 56406 6e95bb49 56406->56428 56490 6e954170 VariantInit VariantInit SafeArrayCreateVector 56406->56490 56408 6e95bb85 56411 6e95bca2 56408->56411 56408->56428 56501 6e94c4a0 VariantInit VariantCopy 56408->56501 56410 6e95bbdb VariantInit VariantInit SafeArrayCreateVector SafeArrayPutElement VariantClear 56503 6e95db10 SafeArrayCreateVector SafeArrayPutElement 56410->56503 56412 6e94c4a0 2 API calls 56411->56412 56417 6e95bd78 56411->56417 56414 6e95bcdd VariantInit VariantInit SafeArrayCreateVector SafeArrayPutElement VariantClear 56412->56414 56419 6e95db10 3 API calls 56414->56419 56422 6e999bb5 77 API calls 56417->56422 56417->56428 56421 6e95bd5d VariantClear VariantClear 56419->56421 56421->56417 56423 6e95bdf7 56422->56423 56424 6e94c4a0 2 API calls 56423->56424 56425 6e95be10 56423->56425 56424->56425 56426 6e999bb5 77 API calls 56425->56426 56425->56428 56427 6e95be59 56426->56427 56427->56428 56429 6e94c4a0 2 API calls 56427->56429 56428->56373 56428->56380 56429->56428 56431 6e999bb5 77 API calls 56430->56431 56432 6e95dbe0 56431->56432 56433 6e95dbe7 56432->56433 56434 6e999533 std::exception::exception 66 API calls 56432->56434 56433->56387 56435 6e95dc1b 56434->56435 56436 6e99ac75 __CxxThrowException@8 RaiseException 56435->56436 56437 6e95dc30 56436->56437 56439 6e95c8c4 56438->56439 56440 6e95c8cc SafeArrayPutElement VariantClear 56438->56440 56439->56440 56441 6e95c8ef 56440->56441 56447 6e95cb2c 56440->56447 56445 6e95cb21 56441->56445 56446 6e99919e std::tr1::_Xweak 67 API calls 56441->56446 56441->56447 56442 6e95cb3f VariantClear VariantClear 56444 6e95cb5f 56442->56444 56443 6e95cb38 SafeArrayDestroy 56443->56442 56444->56391 56448 6e955b80 79 API calls 56445->56448 56446->56445 56447->56442 56447->56443 56448->56447 56450 6e95bf6c 56449->56450 56451 6e95c150 6 API calls 56450->56451 56452 6e95bfb9 56451->56452 56453 6e95c150 6 API calls 56452->56453 56465 6e95c096 56452->56465 56454 6e95bfdd 56453->56454 56455 6e95dc40 77 API calls 56454->56455 56454->56465 56459 6e95c00c 56455->56459 56456 6e95c10e VariantClear VariantClear VariantClear VariantClear 56457 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56456->56457 56458 6e95baca 56457->56458 56458->56399 56458->56428 56510 6e9547d0 107 API calls 56458->56510 56460 6e9544c0 107 API calls 56459->56460 56461 6e95c03c 56460->56461 56462 6e95c044 VariantInit VariantCopy 56461->56462 56461->56465 56463 6e95c05e 56462->56463 56464 6e95c07c VariantInit VariantCopy 56463->56464 56463->56465 56464->56465 56465->56456 56467 6e954a30 SafeArrayPutElement VariantClear 56466->56467 56468 6e954a28 56466->56468 56471 6e954a53 56467->56471 56477 6e954b52 56467->56477 56468->56467 56469 6e954b65 SafeArrayDestroy 56470 6e954b6c VariantClear VariantClear VariantClear 56469->56470 56470->56404 56472 6e94db30 VariantInit SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy VariantClear 56471->56472 56471->56477 56473 6e954b39 56472->56473 56474 6e9556b0 83 API calls 56473->56474 56473->56477 56475 6e954b48 56474->56475 56476 6e956880 9 API calls 56475->56476 56476->56477 56477->56469 56477->56470 56479 6e95cda1 SafeArrayPutElement VariantClear 56478->56479 56480 6e95cd99 56478->56480 56483 6e95cdc6 56479->56483 56484 6e95d292 56479->56484 56480->56479 56481 6e95d2a4 SafeArrayDestroy 56482 6e95d2ab VariantClear VariantClear VariantClear 56481->56482 56482->56406 56483->56484 56485 6e94db30 VariantInit SafeArrayCreateVector SafeArrayPutElement SafeArrayDestroy VariantClear 56483->56485 56484->56481 56484->56482 56486 6e95d279 56485->56486 56486->56484 56487 6e9556b0 83 API calls 56486->56487 56488 6e95d288 56487->56488 56489 6e956880 9 API calls 56488->56489 56489->56484 56491 6e9541e4 56490->56491 56492 6e9541ec SafeArrayPutElement VariantClear 56490->56492 56491->56492 56493 6e954460 56492->56493 56497 6e95420f 56492->56497 56494 6e954473 VariantClear VariantClear 56493->56494 56495 6e95446c SafeArrayDestroy 56493->56495 56496 6e954493 56494->56496 56495->56494 56496->56408 56497->56493 56498 6e954455 56497->56498 56499 6e99919e std::tr1::_Xweak 67 API calls 56497->56499 56500 6e95ddb0 107 API calls 56498->56500 56499->56498 56500->56493 56502 6e94c4b9 56501->56502 56502->56410 56504 6e95db4f 56503->56504 56505 6e95dba1 SafeArrayDestroy 56504->56505 56506 6e95bc60 VariantClear VariantClear 56504->56506 56505->56506 56506->56411 56507->56386 56508->56389 56509->56391 56510->56399 56511->56401 56513 6e999bb5 77 API calls 56512->56513 56514 6e946003 56513->56514 56515 6e999bb5 77 API calls 56514->56515 56516 6e946028 56515->56516 56517 6e945050 77 API calls 56516->56517 56518 6e946042 56517->56518 56519 6e999bb5 77 API calls 56518->56519 56520 6e946049 56519->56520 56521 6e945050 77 API calls 56520->56521 56522 6e946067 56521->56522 56523 6e999bb5 77 API calls 56522->56523 56524 6e94606e 56523->56524 56525 6e945050 77 API calls 56524->56525 56526 6e94608b 56525->56526 56527 6e999bb5 77 API calls 56526->56527 56528 6e946092 56527->56528 56529 6e945050 77 API calls 56528->56529 56530 6e9460ac 56529->56530 56531 6e9416b0 340 API calls 56530->56531 56532 6e9460de moneypunct 56531->56532 56532->56129 56534 6e999bb5 77 API calls 56533->56534 56535 6e94632b 56534->56535 56536 6e999bb5 77 API calls 56535->56536 56537 6e946350 56536->56537 56538 6e945050 77 API calls 56537->56538 56539 6e94636e 56538->56539 56540 6e999bb5 77 API calls 56539->56540 56541 6e946375 56540->56541 56542 6e945050 77 API calls 56541->56542 56543 6e946392 56542->56543 56544 6e999bb5 77 API calls 56543->56544 56545 6e946399 56544->56545 56546 6e945050 77 API calls 56545->56546 56547 6e9463b3 56546->56547 56548 6e999bb5 77 API calls 56547->56548 56549 6e9463c9 56548->56549 56550 6e9463d4 56549->56550 56551 6e946459 56549->56551 56553 6e9416b0 340 API calls 56550->56553 56558 6e999533 66 API calls std::exception::_Copy_str 56551->56558 56557 6e946402 moneypunct 56553->56557 56554 6e94646b 56559 6e99ac75 RaiseException 56554->56559 56556 6e946482 56557->56132 56558->56554 56559->56556 56561 6e949121 56560->56561 56562 6e94912c EnterCriticalSection 56560->56562 56561->56136 56563 6e949150 56562->56563 56564 6e94915b LeaveCriticalSection 56563->56564 56565 6e94923f 56564->56565 56566 6e94916a EnterCriticalSection 56564->56566 56565->56136 56567 6e949185 56566->56567 56568 6e949190 LeaveCriticalSection 56567->56568 56568->56565 56569 6e9491a1 56568->56569 56576 6e956b10 56569->56576 56580 6e956b64 56576->56580 56577 6e956f19 InterlockedCompareExchange 56579 6e9491f3 56577->56579 56579->56565 56647 6e949840 56579->56647 56580->56577 56662 6e962e20 56580->56662 56582 6e956f12 SafeArrayDestroy 56582->56577 56583 6e956bc2 56583->56577 56646 6e956edd 56583->56646 56665 6e9628c0 InterlockedCompareExchange 56583->56665 56585 6e956c6b 56585->56577 56586 6e956c7e SafeArrayGetLBound 56585->56586 56585->56646 56587 6e956c99 SafeArrayGetUBound 56586->56587 56586->56646 56588 6e956cb4 SafeArrayAccessData 56587->56588 56587->56646 56589 6e956cd5 56588->56589 56588->56646 56666 6e955760 67 API calls std::tr1::_Xweak 56589->56666 56591 6e956cf5 SafeArrayUnaccessData 56592 6e956d07 56591->56592 56591->56646 56592->56646 56667 6e941690 77 API calls 56592->56667 56594 6e956d2c 56595 6e999bb5 77 API calls 56594->56595 56596 6e956d3f 56595->56596 56597 6e945050 77 API calls 56596->56597 56598 6e956d59 56597->56598 56599 6e999bb5 77 API calls 56598->56599 56600 6e956d63 56599->56600 56601 6e945050 77 API calls 56600->56601 56602 6e956d7f 56601->56602 56603 6e999bb5 77 API calls 56602->56603 56604 6e956d86 56603->56604 56605 6e945050 77 API calls 56604->56605 56606 6e956da0 56605->56606 56668 6e9450c0 77 API calls 56606->56668 56608 6e956dab 56609 6e999bb5 77 API calls 56608->56609 56610 6e956db2 56609->56610 56611 6e945050 77 API calls 56610->56611 56612 6e956dcf 56611->56612 56669 6e9450c0 77 API calls 56612->56669 56614 6e956dda 56615 6e999bb5 77 API calls 56614->56615 56616 6e956de7 56615->56616 56617 6e945050 77 API calls 56616->56617 56618 6e956e01 56617->56618 56670 6e9450c0 77 API calls 56618->56670 56620 6e956e0c 56621 6e999bb5 77 API calls 56620->56621 56622 6e956e19 56621->56622 56623 6e945050 77 API calls 56622->56623 56624 6e956e33 56623->56624 56625 6e999bb5 77 API calls 56624->56625 56626 6e956e3a 56625->56626 56627 6e945050 77 API calls 56626->56627 56628 6e956e58 56627->56628 56629 6e999bb5 77 API calls 56628->56629 56630 6e956e5f 56629->56630 56631 6e945050 77 API calls 56630->56631 56632 6e956e79 56631->56632 56671 6e9450c0 77 API calls 56632->56671 56634 6e956e84 56672 6e9450c0 77 API calls 56634->56672 56636 6e956e8f 56637 6e999bb5 77 API calls 56636->56637 56638 6e956e9b 56637->56638 56639 6e945050 77 API calls 56638->56639 56640 6e956eb5 56639->56640 56673 6e9450c0 77 API calls 56640->56673 56642 6e956ec0 56674 6e9450c0 77 API calls 56642->56674 56644 6e956ecb 56675 6e942a40 340 API calls 56644->56675 56646->56577 56646->56582 56648 6e999bb5 77 API calls 56647->56648 56650 6e949865 56648->56650 56649 6e949227 56655 6e947140 56649->56655 56650->56649 56676 6e999533 66 API calls std::exception::_Copy_str 56650->56676 56652 6e9498ab 56677 6e99ac75 RaiseException 56652->56677 56654 6e9498c0 56678 6e962820 56655->56678 56657 6e9471f8 56657->56136 56659 6e94719c 56660 6e9471d7 56659->56660 56683 6e99919e 67 API calls 3 library calls 56659->56683 56660->56657 56684 6e999d2c 66 API calls __dosmaperr 56660->56684 56663 6e962e67 56662->56663 56663->56583 56664 6e962e9f InterlockedCompareExchange 56663->56664 56664->56583 56665->56585 56666->56591 56667->56594 56668->56608 56669->56614 56670->56620 56671->56634 56672->56636 56673->56642 56674->56644 56675->56646 56676->56652 56677->56654 56679 6e962845 56678->56679 56680 6e9628af 56679->56680 56681 6e999d66 _malloc 66 API calls 56679->56681 56680->56659 56682 6e962876 56681->56682 56682->56659 56683->56660 56684->56657 56685 6e99a510 56688 6e99fe93 56685->56688 56687 6e99a515 56689 6e99feb8 56688->56689 56690 6e99fec5 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 56688->56690 56689->56690 56692 6e99febc 56689->56692 56691 6e99ff04 56690->56691 56691->56692 56692->56687 56693 175fe38 56694 175fe52 56693->56694 56698 3290040 56694->56698 56703 3290016 56694->56703 56695 175fe5d 56700 329005c 56698->56700 56699 32901d9 56699->56695 56700->56699 56708 32901f8 56700->56708 56712 32901f1 56700->56712 56705 329005c 56703->56705 56704 32901d9 56704->56695 56705->56704 56706 32901f8 LoadLibraryW 56705->56706 56707 32901f1 LoadLibraryW 56705->56707 56706->56705 56707->56705 56709 3290242 LoadLibraryW 56708->56709 56711 32902a4 56709->56711 56711->56700 56713 3290242 LoadLibraryW 56712->56713 56715 32902a4 56713->56715 56715->56700 56716 329a4b8 56717 329a4fd ResumeThread 56716->56717 56718 329a547 56717->56718 56719 6e946bc0 56720 6e946bde 56719->56720 56721 6e946c26 56720->56721 56729 6e999d21 56720->56729 56723 6e946bf7 56724 6e946c1d 56723->56724 56733 6e945300 56723->56733 56728 6e946c3c 56730 6e99e8d5 __EH_prolog3_catch 56729->56730 56731 6e999bb5 77 API calls 56730->56731 56732 6e99e8ed _Fac_tidy 56731->56732 56732->56723 56734 6e945322 56733->56734 56735 6e945329 56734->56735 56741 6e945840 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 56734->56741 56735->56724 56737 6e946c60 SafeArrayCreateVector SafeArrayAccessData 56735->56737 56738 6e946c91 _memmove 56737->56738 56739 6e946cad 56737->56739 56740 6e946c9f SafeArrayUnaccessData 56738->56740 56739->56728 56740->56739 56741->56735 57005 6e99a42d 57006 6e99a438 57005->57006 57007 6e99a4b8 ___BuildCatchObject 57005->57007 57006->57007 57011 6e99a468 57006->57011 57013 6e99a2ab 57006->57013 57009 6e99a498 57009->57007 57010 6e99a2ab __CRT_INIT@12 149 API calls 57009->57010 57010->57007 57011->57007 57011->57009 57012 6e99a2ab __CRT_INIT@12 149 API calls 57011->57012 57012->57009 57014 6e99a2b7 ___BuildCatchObject 57013->57014 57015 6e99a339 57014->57015 57016 6e99a2bf 57014->57016 57018 6e99a39a 57015->57018 57019 6e99a33f 57015->57019 57065 6e99e904 HeapCreate 57016->57065 57020 6e99a3f8 57018->57020 57021 6e99a39f 57018->57021 57025 6e99a35d 57019->57025 57032 6e99a2c8 ___BuildCatchObject 57019->57032 57075 6e99d4e7 66 API calls _doexit 57019->57075 57020->57032 57083 6e99ec2f 79 API calls __freefls@4 57020->57083 57023 6e99e948 ___set_flsgetvalue 3 API calls 57021->57023 57022 6e99a2c4 57024 6e99a2cf 57022->57024 57022->57032 57027 6e99a3a4 57023->57027 57066 6e99ec9d 86 API calls 5 library calls 57024->57066 57030 6e99a371 57025->57030 57076 6e99dd67 67 API calls __aligned_free 57025->57076 57080 6e99cb28 66 API calls __calloc_crt 57027->57080 57079 6e99a384 70 API calls __mtterm 57030->57079 57032->57011 57034 6e99a2d4 __RTC_Initialize 57037 6e99a2d8 57034->57037 57044 6e99a2e4 GetCommandLineA 57034->57044 57036 6e99a3b0 57036->57032 57039 6e99a3bc DecodePointer 57036->57039 57067 6e99e922 HeapDestroy 57037->57067 57038 6e99a367 57077 6e99e97c 70 API calls __aligned_free 57038->57077 57046 6e99a3d1 57039->57046 57042 6e99a2dd 57042->57032 57043 6e99a36c 57078 6e99e922 HeapDestroy 57043->57078 57068 6e99fc46 71 API calls 2 library calls 57044->57068 57049 6e99a3ec 57046->57049 57050 6e99a3d5 57046->57050 57048 6e99a2f4 57069 6e99db22 73 API calls __calloc_crt 57048->57069 57082 6e999d2c 66 API calls __dosmaperr 57049->57082 57081 6e99e9b9 66 API calls 4 library calls 57050->57081 57054 6e99a2fe 57056 6e99a302 57054->57056 57071 6e99fb8b 95 API calls 3 library calls 57054->57071 57055 6e99a3dc GetCurrentThreadId 57055->57032 57070 6e99e97c 70 API calls __aligned_free 57056->57070 57059 6e99a30e 57060 6e99a322 57059->57060 57072 6e99f915 94 API calls 6 library calls 57059->57072 57060->57042 57074 6e99dd67 67 API calls __aligned_free 57060->57074 57063 6e99a317 57063->57060 57073 6e99d2fa 77 API calls 4 library calls 57063->57073 57065->57022 57066->57034 57067->57042 57068->57048 57069->57054 57070->57037 57071->57059 57072->57063 57073->57060 57074->57056 57075->57025 57076->57038 57077->57043 57078->57030 57079->57032 57080->57036 57081->57055 57082->57042 57083->57032 56742 3290730 56743 3290774 56742->56743 56746 6e962ed0 56743->56746 56744 32907bb 56747 6e962f09 56746->56747 56767 6e963006 moneypunct 56746->56767 56748 6e999bb5 77 API calls 56747->56748 56749 6e962f31 56748->56749 56750 6e999bb5 77 API calls 56749->56750 56751 6e962f54 56750->56751 56752 6e945050 77 API calls 56751->56752 56753 6e962f6e 56752->56753 56754 6e999bb5 77 API calls 56753->56754 56755 6e962f75 56754->56755 56756 6e945050 77 API calls 56755->56756 56757 6e962f8f 56756->56757 56758 6e999bb5 77 API calls 56757->56758 56759 6e962f96 56758->56759 56760 6e945050 77 API calls 56759->56760 56761 6e962fb0 56760->56761 56762 6e999bb5 77 API calls 56761->56762 56763 6e962fb7 56762->56763 56764 6e945050 77 API calls 56763->56764 56765 6e962fd1 56764->56765 56766 6e9416b0 340 API calls 56765->56766 56766->56767 56767->56744 57084 6e9616af 57085 6e9616b4 57084->57085 57086 6e96170f 57085->57086 57088 6e999bb5 77 API calls 57085->57088 57087 6e961769 57086->57087 57089 6e999bb5 77 API calls 57086->57089 57091 6e9617c3 57087->57091 57095 6e999bb5 77 API calls 57087->57095 57090 6e9616cd 57088->57090 57092 6e961727 57089->57092 57093 6e9616e9 57090->57093 57134 6e95ea40 57090->57134 57094 6e96181d 57091->57094 57099 6e999bb5 77 API calls 57091->57099 57096 6e961743 57092->57096 57103 6e95ea40 78 API calls 57092->57103 57139 6e948400 77 API calls 2 library calls 57093->57139 57097 6e961877 57094->57097 57104 6e999bb5 77 API calls 57094->57104 57100 6e961781 57095->57100 57141 6e948400 77 API calls 2 library calls 57096->57141 57102 6e9618d1 57097->57102 57108 6e999bb5 77 API calls 57097->57108 57105 6e9617db 57099->57105 57101 6e96179d 57100->57101 57107 6e95ea40 78 API calls 57100->57107 57143 6e948400 77 API calls 2 library calls 57101->57143 57103->57096 57109 6e961835 57104->57109 57111 6e9617f7 57105->57111 57117 6e95ea40 78 API calls 57105->57117 57107->57101 57113 6e96188f 57108->57113 57115 6e961851 57109->57115 57122 6e95ea40 78 API calls 57109->57122 57145 6e948400 77 API calls 2 library calls 57111->57145 57112 6e961705 57140 6e9480b0 67 API calls moneypunct 57112->57140 57120 6e9618ab 57113->57120 57125 6e95ea40 78 API calls 57113->57125 57147 6e948400 77 API calls 2 library calls 57115->57147 57116 6e96175f 57142 6e9480b0 67 API calls moneypunct 57116->57142 57117->57111 57149 6e948400 77 API calls 2 library calls 57120->57149 57121 6e9617b9 57144 6e9480b0 67 API calls moneypunct 57121->57144 57122->57115 57124 6e961813 57146 6e9480b0 67 API calls moneypunct 57124->57146 57125->57120 57130 6e96186d 57148 6e9480b0 67 API calls moneypunct 57130->57148 57131 6e9618c7 57150 6e9480b0 67 API calls moneypunct 57131->57150 57135 6e999bb5 77 API calls 57134->57135 57136 6e95ea6b 57135->57136 57137 6e95ea7e SysAllocString 57136->57137 57138 6e95ea99 57136->57138 57137->57138 57138->57093 57139->57112 57140->57086 57141->57116 57142->57087 57143->57121 57144->57091 57145->57124 57146->57094 57147->57130 57148->57097 57149->57131 57150->57102 56768 6e95e2ce 56769 6e999bb5 77 API calls 56768->56769 56770 6e95e2d5 56769->56770 56771 6e95e2ee 56770->56771 56825 6e961fd0 56770->56825 56773 6e999bb5 77 API calls 56771->56773 56784 6e95e343 56771->56784 56776 6e95e327 56773->56776 56774 6e95e3a6 56778 6e999bb5 77 API calls 56774->56778 56824 6e95e564 moneypunct 56774->56824 56775 6e95e360 56777 6e999bb5 77 API calls 56775->56777 56850 6e95eae0 56776->56850 56779 6e95e367 56777->56779 56782 6e95e400 56778->56782 56865 6e961910 78 API calls 2 library calls 56779->56865 56780 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56783 6e95e76e 56780->56783 56787 6e999bb5 77 API calls 56782->56787 56784->56774 56784->56775 56786 6e95e384 56866 6e961b20 11 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 56786->56866 56788 6e95e428 56787->56788 56791 6e945050 77 API calls 56788->56791 56790 6e95e399 56790->56774 56792 6e95e442 56791->56792 56793 6e999bb5 77 API calls 56792->56793 56794 6e95e449 56793->56794 56795 6e945050 77 API calls 56794->56795 56796 6e95e463 56795->56796 56797 6e999bb5 77 API calls 56796->56797 56798 6e95e46a 56797->56798 56799 6e945050 77 API calls 56798->56799 56800 6e95e484 56799->56800 56801 6e999bb5 77 API calls 56800->56801 56802 6e95e48b 56801->56802 56803 6e945050 77 API calls 56802->56803 56804 6e95e4a5 56803->56804 56805 6e999bb5 77 API calls 56804->56805 56806 6e95e4ac 56805->56806 56807 6e945050 77 API calls 56806->56807 56808 6e95e4c6 56807->56808 56809 6e95e4d3 56808->56809 56867 6e99919e 67 API calls 3 library calls 56808->56867 56811 6e999bb5 77 API calls 56809->56811 56812 6e95e4e3 56811->56812 56813 6e945050 77 API calls 56812->56813 56814 6e95e4fd 56813->56814 56815 6e999bb5 77 API calls 56814->56815 56816 6e95e504 56815->56816 56817 6e945050 77 API calls 56816->56817 56818 6e95e51e 56817->56818 56819 6e999bb5 77 API calls 56818->56819 56820 6e95e525 56819->56820 56821 6e945050 77 API calls 56820->56821 56822 6e95e53f 56821->56822 56823 6e9416b0 340 API calls 56822->56823 56823->56824 56824->56780 56826 6e999bb5 77 API calls 56825->56826 56827 6e962013 56826->56827 56828 6e9621f3 56827->56828 56829 6e962020 56827->56829 56902 6e999533 66 API calls std::exception::_Copy_str 56828->56902 56868 6e966480 56829->56868 56832 6e96220b 56903 6e99ac75 RaiseException 56832->56903 56834 6e962226 56835 6e96206c 56884 6e9335f0 56835->56884 56837 6e96216e 56895 6e962300 56837->56895 56839 6e962194 56840 6e962300 77 API calls 56839->56840 56841 6e9621a0 56840->56841 56842 6e962300 77 API calls 56841->56842 56843 6e9621ad 56842->56843 56844 6e962300 77 API calls 56843->56844 56845 6e9621ba 56844->56845 56846 6e962300 77 API calls 56845->56846 56847 6e9621c6 56846->56847 56848 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56847->56848 56849 6e9621ef 56848->56849 56849->56771 56851 6e999bb5 77 API calls 56850->56851 56852 6e95eb17 56851->56852 56853 6e95eb22 56852->56853 56854 6e95f4c9 56852->56854 56965 6e99a25a GetSystemTimeAsFileTime 56853->56965 56973 6e999533 66 API calls std::exception::_Copy_str 56854->56973 56856 6e95f4dc 56974 6e99ac75 RaiseException 56856->56974 56859 6e95f4f1 56860 6e95eb5b 56967 6e999dfa 56860->56967 56865->56786 56866->56790 56867->56809 56869 6e96655d 56868->56869 56872 6e9664c8 56868->56872 56870 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56869->56870 56871 6e96657d 56870->56871 56871->56835 56872->56869 56873 6e96651d 56872->56873 56904 6e932f40 77 API calls 56872->56904 56873->56869 56907 6e932f40 77 API calls 56873->56907 56876 6e966535 56908 6e966400 77 API calls std::tr1::_Xweak 56876->56908 56877 6e9664f5 56905 6e966400 77 API calls std::tr1::_Xweak 56877->56905 56880 6e96654e 56909 6e99ac75 RaiseException 56880->56909 56881 6e96650e 56906 6e99ac75 RaiseException 56881->56906 56910 6e986d40 56884->56910 56887 6e966480 77 API calls 56888 6e93364c 56887->56888 56917 6e934b30 56888->56917 56890 6e9336a7 56921 6e9686e0 56890->56921 56892 6e9336bc 56893 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56892->56893 56894 6e933701 56893->56894 56894->56837 56896 6e96231d 56895->56896 56897 6e9623aa 56896->56897 56898 6e999bb5 77 API calls 56896->56898 56897->56839 56900 6e962331 56898->56900 56899 6e962374 moneypunct 56899->56839 56900->56899 56947 6e962480 56900->56947 56902->56832 56903->56834 56904->56877 56905->56881 56906->56873 56907->56876 56908->56880 56909->56869 56911 6e966480 77 API calls 56910->56911 56912 6e986d7f 56911->56912 56929 6e968d80 56912->56929 56915 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56916 6e933630 56915->56916 56916->56887 56918 6e934b65 56917->56918 56939 6e934fa0 56918->56939 56920 6e934b7f 56920->56890 56923 6e968728 56921->56923 56922 6e968765 56924 6e99948b __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 56922->56924 56923->56922 56945 6e967cd0 77 API calls 3 library calls 56923->56945 56925 6e96878a 56924->56925 56925->56892 56927 6e968756 56946 6e99ac75 RaiseException 56927->56946 56930 6e999d66 _malloc 66 API calls 56929->56930 56934 6e968d8f 56930->56934 56931 6e968dbb 56931->56915 56932 6e9991f6 70 API calls 56932->56934 56933 6e968dc1 std::exception::exception 56938 6e99ac75 RaiseException 56933->56938 56934->56931 56934->56932 56934->56933 56937 6e999d66 _malloc 66 API calls 56934->56937 56936 6e968df0 56937->56934 56938->56936 56940 6e999bb5 77 API calls 56939->56940 56941 6e934fcf 56940->56941 56942 6e934ff1 56941->56942 56944 6e935050 81 API calls _memcpy_s 56941->56944 56942->56920 56944->56942 56945->56927 56946->56922 56948 6e962498 56947->56948 56949 6e9624ec 56948->56949 56954 6e9627b0 56948->56954 56949->56897 56953 6e9624df 56953->56897 56955 6e999bb5 77 API calls 56954->56955 56956 6e9627bd 56955->56956 56957 6e9624d5 56956->56957 56963 6e999533 66 API calls std::exception::_Copy_str 56956->56963 56962 6e9625c0 67 API calls 56957->56962 56959 6e9627ff 56964 6e99ac75 RaiseException 56959->56964 56961 6e962814 56962->56953 56963->56959 56964->56961 56966 6e99a28a __aulldiv 56965->56966 56966->56860 56975 6e99eae6 56967->56975 56970 6e999e0c 56971 6e99eae6 __getptd 66 API calls 56970->56971 56972 6e95eb69 56971->56972 56972->56784 56973->56856 56974->56859 56980 6e99ea6d GetLastError 56975->56980 56977 6e99eaee 56978 6e95eb61 56977->56978 56995 6e99d4f6 66 API calls 3 library calls 56977->56995 56978->56970 56996 6e99e948 TlsGetValue 56980->56996 56983 6e99eada SetLastError 56983->56977 56984 6e99ea8c 56999 6e99cb28 66 API calls __calloc_crt 56984->56999 56986 6e99ea98 56986->56983 56987 6e99eaa0 DecodePointer 56986->56987 56988 6e99eab5 56987->56988 56989 6e99eab9 56988->56989 56990 6e99ead1 56988->56990 57000 6e99e9b9 66 API calls 4 library calls 56989->57000 57001 6e999d2c 66 API calls __dosmaperr 56990->57001 56993 6e99eac1 GetCurrentThreadId 56993->56983 56994 6e99ead7 56994->56983 56997 6e99e978 56996->56997 56998 6e99e95d DecodePointer TlsSetValue 56996->56998 56997->56983 56997->56984 56998->56997 56999->56986 57000->56993 57001->56994

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 720 6e95b6b0-6e95b758 VariantInit * 2 721 6e95b764-6e95b769 720->721 722 6e95b75a-6e95b75f call 6e9ac1e0 720->722 724 6e95b773-6e95b784 721->724 725 6e95b76b-6e95b770 721->725 722->721 727 6e95be96-6e95beb4 VariantClear * 2 724->727 728 6e95b78a-6e95b791 724->728 725->724 731 6e95beb6-6e95bebb 727->731 732 6e95bebe-6e95beca 727->732 729 6e95b793-6e95b798 728->729 730 6e95b7b9-6e95b7e2 SafeArrayCreateVector 728->730 735 6e95b7a2-6e95b7b3 729->735 736 6e95b79a-6e95b79f 729->736 737 6e95b7e4-6e95b7e7 730->737 738 6e95b7ec-6e95b809 SafeArrayPutElement VariantClear 730->738 731->732 733 6e95bed4-6e95bef2 call 6e99948b 732->733 734 6e95becc-6e95bed1 732->734 734->733 735->727 735->730 736->735 737->738 740 6e95be85-6e95be8d 738->740 741 6e95b80f-6e95b81d 738->741 740->727 744 6e95be8f-6e95be90 SafeArrayDestroy 740->744 745 6e95b81f-6e95b824 call 6e9ac1e0 741->745 746 6e95b829-6e95b841 741->746 744->727 745->746 746->740 749 6e95b847-6e95b853 746->749 749->740 750 6e95b859-6e95b85e 749->750 750->740 751 6e95b864-6e95b86b 750->751 752 6e95b871-6e95b87e 751->752 753 6e95b913-6e95b917 751->753 756 6e95b880-6e95b882 752->756 757 6e95b888-6e95b8ea call 6e95dbc0 call 6e955790 call 6e95c850 752->757 754 6e95b921-6e95b941 call 6e94dcd0 753->754 755 6e95b919-6e95b91b 753->755 754->740 762 6e95b947-6e95b964 call 6e94dcd0 754->762 755->740 755->754 756->740 756->757 769 6e95b8ef-6e95b8f8 757->769 762->740 768 6e95b96a-6e95b96d 762->768 770 6e95b993-6e95b9bf 768->770 771 6e95b96f-6e95b98d call 6e94dcd0 768->771 772 6e95b904-6e95b90e call 6e95e800 769->772 773 6e95b8fa-6e95b8ff call 6e95e800 769->773 774 6e95b9c1-6e95b9c6 call 6e9ac1e0 770->774 775 6e95b9cb-6e95ba1d VariantClear 770->775 771->740 771->770 772->770 783 6e95be83 773->783 774->775 775->740 785 6e95ba23-6e95ba31 775->785 783->740 786 6e95ba33-6e95ba38 call 6e9ac1e0 785->786 787 6e95ba3d-6e95ba8b 785->787 786->787 787->740 790 6e95ba91-6e95ba95 787->790 790->740 791 6e95ba9b-6e95baa7 call 6e999bb5 790->791 794 6e95bab6 791->794 795 6e95baa9-6e95bab4 791->795 796 6e95bab8-6e95bacc call 6e95bf00 794->796 795->796 796->740 799 6e95bad2-6e95bada 796->799 800 6e95baf3-6e95baf8 799->800 801 6e95badc-6e95baed call 6e9547d0 799->801 803 6e95bb11-6e95bb2e call 6e9549b0 800->803 804 6e95bafa-6e95bb0b call 6e9547d0 800->804 801->740 801->800 803->740 810 6e95bb34-6e95bb4b call 6e95cd20 803->810 804->740 804->803 810->740 813 6e95bb51-6e95bb8e call 6e955790 call 6e954170 810->813 818 6e95bb90-6e95bb95 call 6e95e800 813->818 819 6e95bb9a-6e95bba8 call 6e95e800 813->819 818->783 824 6e95bca2 819->824 825 6e95bbae-6e95bbc0 819->825 826 6e95bca8-6e95bcae 824->826 825->824 827 6e95bbc6-6e95bc5b call 6e94c4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6e95db10 825->827 829 6e95bcb4-6e95bcc6 826->829 830 6e95bd78-6e95bdc8 826->830 839 6e95bc60-6e95bc75 827->839 829->830 832 6e95bccc-6e95bd76 call 6e94c4a0 VariantInit * 2 SafeArrayCreateVector SafeArrayPutElement VariantClear call 6e95db10 VariantClear * 2 829->832 830->783 840 6e95bdce-6e95bdd7 830->840 832->830 843 6e95bc77-6e95bc8d 839->843 844 6e95bc90-6e95bca0 VariantClear * 2 839->844 840->783 845 6e95bddd-6e95bde4 840->845 843->844 844->826 845->783 847 6e95bdea-6e95be03 call 6e999bb5 845->847 850 6e95be05-6e95be10 call 6e94c4a0 847->850 851 6e95be12 847->851 852 6e95be14-6e95be3c 850->852 851->852 854 6e95be7f 852->854 855 6e95be3e-6e95be50 852->855 854->783 855->854 857 6e95be52-6e95be65 call 6e999bb5 855->857 860 6e95be67-6e95be6f call 6e94c4a0 857->860 861 6e95be71 857->861 863 6e95be73-6e95be7c 860->863 861->863 863->854
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E95B73F
                                                        • VariantInit.OLEAUT32(?), ref: 6E95B748
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95B7BE
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95B7F5
                                                        • VariantClear.OLEAUT32(?), ref: 6E95B801
                                                          • Part of subcall function 6E95C850: VariantInit.OLEAUT32(?), ref: 6E95C88F
                                                          • Part of subcall function 6E95C850: VariantInit.OLEAUT32(?), ref: 6E95C895
                                                          • Part of subcall function 6E95C850: SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95C8A0
                                                          • Part of subcall function 6E95C850: SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E95C8D5
                                                          • Part of subcall function 6E95C850: VariantClear.OLEAUT32(?), ref: 6E95C8E1
                                                        • VariantClear.OLEAUT32(?), ref: 6E95BA15
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95BE90
                                                        • VariantClear.OLEAUT32(?), ref: 6E95BEA3
                                                        • VariantClear.OLEAUT32(?), ref: 6E95BEA9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArrayClearSafe$Init$CreateElementVector$Destroy
                                                        • String ID:
                                                        • API String ID: 2012514194-0
                                                        • Opcode ID: 1ee2ab6e975db9976f390fc5abf978d28d8eccd44e7678be9d683b66eb835943
                                                        • Instruction ID: 9e2e82af70abb3791ec160e0641f259fe1c7cc426fbc2e752d2823289defb857
                                                        • Opcode Fuzzy Hash: 1ee2ab6e975db9976f390fc5abf978d28d8eccd44e7678be9d683b66eb835943
                                                        • Instruction Fuzzy Hash: D5525B71900219DFDB10DFA8C894BEEBBB9BF99304F148599E509AB345EB30E945CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1320 6e94b6c0-6e94b715 GetModuleHandleW 1321 6e94b717-6e94b724 LoadLibraryW 1320->1321 1322 6e94b72a-6e94b738 GetProcAddress 1320->1322 1321->1322 1323 6e94b94c-6e94b954 1321->1323 1322->1323 1324 6e94b73e-6e94b750 1322->1324 1325 6e94b956-6e94b95b 1323->1325 1326 6e94b95e-6e94b96a 1323->1326 1324->1323 1331 6e94b756-6e94b771 1324->1331 1325->1326 1327 6e94b974-6e94b98f call 6e99948b 1326->1327 1328 6e94b96c-6e94b971 1326->1328 1328->1327 1331->1323 1334 6e94b777-6e94b788 1331->1334 1334->1323 1336 6e94b78e-6e94b791 1334->1336 1336->1323 1337 6e94b797-6e94b7b2 1336->1337 1337->1323 1339 6e94b7b8-6e94b7c5 1337->1339 1339->1323 1341 6e94b7cb-6e94b7d0 1339->1341 1342 6e94b7d2-6e94b7d7 1341->1342 1343 6e94b7da-6e94b7e7 1341->1343 1342->1343 1344 6e94b7ec-6e94b7ee 1343->1344 1344->1323 1345 6e94b7f4-6e94b7f9 1344->1345 1346 6e94b805-6e94b80a 1345->1346 1347 6e94b7fb-6e94b800 call 6e9ac1e0 1345->1347 1349 6e94b814-6e94b829 1346->1349 1350 6e94b80c-6e94b811 1346->1350 1347->1346 1349->1323 1352 6e94b82f-6e94b849 1349->1352 1350->1349 1353 6e94b850-6e94b85b 1352->1353 1353->1353 1354 6e94b85d-6e94b8a4 call 6e99a116 GetModuleHandleW 1353->1354 1354->1323 1357 6e94b8aa-6e94b8c1 1354->1357 1358 6e94b8c5-6e94b8d0 1357->1358 1358->1358 1359 6e94b8d2-6e94b8f0 GetProcAddress 1358->1359 1359->1323 1360 6e94b8f2-6e94b8ff call 6e935340 1359->1360 1364 6e94b900-6e94b905 1360->1364 1364->1364 1365 6e94b907-6e94b90d 1364->1365 1365->1364 1366 6e94b90f-6e94b912 1365->1366 1367 6e94b914-6e94b929 1366->1367 1368 6e94b93a 1366->1368 1369 6e94b931-6e94b938 1367->1369 1370 6e94b92b-6e94b92e 1367->1370 1371 6e94b93d-6e94b948 call 6e94ad80 1368->1371 1369->1371 1370->1369 1371->1323
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(mscoree.dll,64F62E83), ref: 6E94B711
                                                        • LoadLibraryW.KERNEL32(mscoree.dll), ref: 6E94B71C
                                                        • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 6E94B730
                                                        • __cftoe.LIBCMT ref: 6E94B870
                                                        • GetModuleHandleW.KERNEL32(?), ref: 6E94B88B
                                                        • GetProcAddress.KERNEL32(00000000,C8F5E518), ref: 6E94B8D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc$LibraryLoad__cftoe
                                                        • String ID: CLRCreateInstance$mscoree.dll$v4.0.30319
                                                        • API String ID: 1275574042-506955582
                                                        • Opcode ID: 7323df13b161314859b01139595c3e5d44cdadd4119bf64955cc1fafc7c18110
                                                        • Instruction ID: c53b504c52e9a84e942350a1e09dc51e4a6bc92568194b1194c048887749fd76
                                                        • Opcode Fuzzy Hash: 7323df13b161314859b01139595c3e5d44cdadd4119bf64955cc1fafc7c18110
                                                        • Instruction Fuzzy Hash: 5C9136B1D0424ADFDB04DFE8C8809AEBBB5BF89314F10866CE119EB254E730A946CF55
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: (oq$(oq$,q$,q$Hq
                                                        • API String ID: 0-962059274
                                                        • Opcode ID: 5ef474468f21e4bd92bd64578b4b45f7f8d8491f75e03cabe05dfdd0960814c0
                                                        • Instruction ID: 64ab230827beb3423f706d34c3386eace89268daf00baed0f60aba4f7350e751
                                                        • Opcode Fuzzy Hash: 5ef474468f21e4bd92bd64578b4b45f7f8d8491f75e03cabe05dfdd0960814c0
                                                        • Instruction Fuzzy Hash: C6629075A00215DFDB59DF69C484A6EBBB2FF88310B158269ED06DB3A4CB71EC41CB90
                                                        APIs
                                                        • TerminateProcess.KERNELBASE(?,?), ref: 0329A311
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ProcessTerminate
                                                        • String ID:
                                                        • API String ID: 560597551-0
                                                        • Opcode ID: eb0c2a199189ccc3bdd88401c64cb60f3229ea72114092469bb97e4e929453fe
                                                        • Instruction ID: 9634826842061e5ad33add0c53dec43e52398d218cb1f0dc1a74b19560b49302
                                                        • Opcode Fuzzy Hash: eb0c2a199189ccc3bdd88401c64cb60f3229ea72114092469bb97e4e929453fe
                                                        • Instruction Fuzzy Hash: 9E21BDB4D152489FDB20CFA9D584ADEFBF4EB49310F24902AE818B3310C735A945CF65
                                                        APIs
                                                        • TerminateProcess.KERNELBASE(?,?), ref: 0329A311
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ProcessTerminate
                                                        • String ID:
                                                        • API String ID: 560597551-0
                                                        • Opcode ID: 00e7fca2393bb658915a6c588469393bbd5832aee05eebd9f441debb3dd8d396
                                                        • Instruction ID: 1889469a101e3821df3ac7137d2c54281c00e9de0d15ff03a61392a4f17a2137
                                                        • Opcode Fuzzy Hash: 00e7fca2393bb658915a6c588469393bbd5832aee05eebd9f441debb3dd8d396
                                                        • Instruction Fuzzy Hash: 59219BB5D152089FDB20CFA9D584ADEFBF4EB49310F24901AE818B3350C775A945CF65
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8q
                                                        • API String ID: 0-4083045702
                                                        • Opcode ID: 8c4b2fc2b6768a8c8d7af538b4d128bce8f3bb462243c1f506e999da70d61d5c
                                                        • Instruction ID: 54d9e307ae97ca5c4924f61ea238b92cd8d7d6c041da000707bc41d3eec900d2
                                                        • Opcode Fuzzy Hash: 8c4b2fc2b6768a8c8d7af538b4d128bce8f3bb462243c1f506e999da70d61d5c
                                                        • Instruction Fuzzy Hash: 9831D275E01208AFDB04CFA5D484AEEFBF1FF89300F10906AE915BB260DB709A05CB95
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8q
                                                        • API String ID: 0-4083045702
                                                        • Opcode ID: 53cfcbf9bc780553648201caec81f8368cf08a452c119fbf431cd948c1641b48
                                                        • Instruction ID: e57d65944616a69e35d670a6209dfb156e6da2ec7f80e94231e3de2f24a67c7a
                                                        • Opcode Fuzzy Hash: 53cfcbf9bc780553648201caec81f8368cf08a452c119fbf431cd948c1641b48
                                                        • Instruction Fuzzy Hash: 0531C275E01208AFDB04CFA5D484AEEFBF5FF49310F10906AE915B7260DB70AA04CB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f59f6c193b01cbfc0179af47eca2c99aeca48ae4079717f02d5410a49516f738
                                                        • Instruction ID: f750996ab54356862237fed9d938cb493c15fd06ab40b4a7db0e1a76ded370a2
                                                        • Opcode Fuzzy Hash: f59f6c193b01cbfc0179af47eca2c99aeca48ae4079717f02d5410a49516f738
                                                        • Instruction Fuzzy Hash: 3192ECB4A01329CFDB25DF24E958BA9BB72FB49310F5081E9E80967364CB365E81CF51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f16c6b2a17fcbe05c2d7b0b2c7c6ecd547aded3e2db806d772d7153edb59f206
                                                        • Instruction ID: b4376d8e1541a9fe012af7bf37d3b9511c545f84956e405744279ebd6fc33825
                                                        • Opcode Fuzzy Hash: f16c6b2a17fcbe05c2d7b0b2c7c6ecd547aded3e2db806d772d7153edb59f206
                                                        • Instruction Fuzzy Hash: 3051B274E05318CBEB58CFAAD944A9EFBF2AF89300F14C0A9D809AB355DB705981CF01
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E9584BF
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E9584D2
                                                        • SafeArrayGetElement.OLEAUT32 ref: 6E95850A
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E9594C1
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E9594D4
                                                        • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E95950C
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E9597A4
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E9597B7
                                                        • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E9597F2
                                                          • Part of subcall function 6E953A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E953B71
                                                          • Part of subcall function 6E953A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E953B83
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E959D5F
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E959D72
                                                        • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E959DAF
                                                          • Part of subcall function 6E953A90: SafeArrayDestroy.OLEAUT32(?), ref: 6E953BCF
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E95A1BC
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E95A1CF
                                                        • SafeArrayGetElement.OLEAUT32(?,?,00000000), ref: 6E95A20C
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Bound$Destroy$Element
                                                        • String ID: A
                                                        • API String ID: 959723449-3554254475
                                                        • Opcode ID: b6d6daa1f9b8a284b476af6384402f255812add4cd403d4fb683155e23daea7a
                                                        • Instruction ID: 166916fe361e6a87bb919c5e6c0f3a1b896790998c51d6df8359839f706d1586
                                                        • Opcode Fuzzy Hash: b6d6daa1f9b8a284b476af6384402f255812add4cd403d4fb683155e23daea7a
                                                        • Instruction Fuzzy Hash: 03236C71A00205DFEB40DFA8C894F9977BDAF89304F148494EA09AF396DB71E985CF60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 865 6e952970-6e9529c1 866 6e9529c3-6e9529c8 call 6e9ac1e0 865->866 867 6e9529cd-6e9529d7 865->867 866->867 931 6e9529d8 call 149d149 867->931 932 6e9529d8 call 149d148 867->932 869 6e9529da-6e9529dc 870 6e952d12-6e952d18 869->870 871 6e9529e2-6e9529e8 869->871 872 6e952d21-6e952d37 870->872 873 6e952d1a-6e952d1b SafeArrayDestroy 870->873 871->872 874 6e9529ee-6e952a1a SafeArrayGetLBound SafeArrayGetUBound 871->874 873->872 874->870 875 6e952a20-6e952a37 SafeArrayGetElement 874->875 875->870 876 6e952a3d-6e952a4d 875->876 876->866 877 6e952a53-6e952a66 876->877 933 6e952a67 call 149d149 877->933 934 6e952a67 call 149d148 877->934 878 6e952a69-6e952a6f 879 6e952a75-6e952a77 878->879 880 6e952d5a-6e952d5f 878->880 879->880 881 6e952a7d-6e952a92 call 6e9538e0 879->881 882 6e952c76-6e952c78 880->882 887 6e952c58-6e952c63 881->887 888 6e952a98-6e952aac 881->888 882->870 883 6e952c7e-6e952c86 882->883 883->870 891 6e952c65-6e952c6a 887->891 892 6e952c6d-6e952c72 887->892 889 6e952ab6-6e952acc VariantInit 888->889 890 6e952aae-6e952ab3 888->890 889->866 893 6e952ad2-6e952ae3 889->893 890->889 891->892 892->882 894 6e952ae5-6e952ae7 893->894 895 6e952ae9-6e952aeb 893->895 896 6e952aee-6e952af2 894->896 895->896 897 6e952af4-6e952af6 896->897 898 6e952af8 896->898 899 6e952afa-6e952b34 897->899 898->899 901 6e952c8b-6e952caa VariantClear * 2 899->901 902 6e952b3a-6e952b50 VariantInit 899->902 901->892 903 6e952cac-6e952cb4 901->903 902->866 904 6e952b56-6e952b67 902->904 903->892 905 6e952b6d-6e952b6f 904->905 906 6e952b69-6e952b6b 904->906 908 6e952b72-6e952b76 905->908 906->908 909 6e952b7c 908->909 910 6e952b78-6e952b7a 908->910 911 6e952b7e-6e952bb8 909->911 910->911 913 6e952bbe-6e952bcb 911->913 914 6e952d3a-6e952d55 VariantClear * 3 911->914 913->914 915 6e952bd1-6e952bf3 call 6e963160 913->915 914->887 919 6e952cb6-6e952cf1 VariantClear * 3 915->919 920 6e952bf9-6e952c1f VariantClear * 3 915->920 927 6e952cf3-6e952cf6 919->927 928 6e952cfb-6e952d06 919->928 921 6e952c21-6e952c26 920->921 922 6e952c29-6e952c34 920->922 921->922 923 6e952c36-6e952c3b 922->923 924 6e952c3e-6e952c4d 922->924 923->924 924->875 926 6e952c53 924->926 926->870 927->928 929 6e952d10 928->929 930 6e952d08-6e952d0d 928->930 929->870 930->929 931->869 932->869 933->878 934->878
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E9529F6
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E952A08
                                                        • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E952A2F
                                                        • VariantInit.OLEAUT32(?), ref: 6E952ABB
                                                        • VariantInit.OLEAUT32(?), ref: 6E952B3F
                                                        • VariantClear.OLEAUT32(?), ref: 6E952C04
                                                        • VariantClear.OLEAUT32(?), ref: 6E952C0B
                                                        • VariantClear.OLEAUT32(?), ref: 6E952C12
                                                        • VariantClear.OLEAUT32(?), ref: 6E952C96
                                                        • VariantClear.OLEAUT32(?), ref: 6E952C9D
                                                        • VariantClear.OLEAUT32(?), ref: 6E952CD6
                                                        • VariantClear.OLEAUT32(?), ref: 6E952CDD
                                                        • VariantClear.OLEAUT32(?), ref: 6E952CE4
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E952D1B
                                                        • VariantClear.OLEAUT32(?), ref: 6E952D45
                                                        • VariantClear.OLEAUT32(?), ref: 6E952D4C
                                                        • VariantClear.OLEAUT32(?), ref: 6E952D53
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArraySafe$BoundInit$DestroyElement
                                                        • String ID:
                                                        • API String ID: 214056513-0
                                                        • Opcode ID: e03920b0b39269b7eff9eb472a3162767ed3332a5be5890c7ed575042712f088
                                                        • Instruction ID: f8ce797d19d22fa9190f6866ffa257e508fddb838b40ffba5b23c2bef6fee504
                                                        • Opcode Fuzzy Hash: e03920b0b39269b7eff9eb472a3162767ed3332a5be5890c7ed575042712f088
                                                        • Instruction Fuzzy Hash: 48C134716083429FD700CFA8C884A5BBBF9AF9A304F20895DF695CB361D675E845CF62

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 935 6e94af30-6e94af95 VariantInit * 3 936 6e94af97-6e94af9c call 6e9ac1e0 935->936 937 6e94afa1-6e94afa7 935->937 936->937 939 6e94afb1-6e94afbf 937->939 940 6e94afa9-6e94afae 937->940 1016 6e94afc0 call 149d149 939->1016 1017 6e94afc0 call 149d148 939->1017 940->939 941 6e94afc2-6e94afc4 942 6e94b22c-6e94b252 VariantClear * 3 941->942 943 6e94afca-6e94afda call 6e9538e0 941->943 944 6e94b254-6e94b257 942->944 945 6e94b25c-6e94b26a 942->945 943->942 950 6e94afe0-6e94aff4 943->950 944->945 948 6e94b274-6e94b288 945->948 949 6e94b26c-6e94b271 945->949 949->948 951 6e94aff6-6e94aff9 950->951 952 6e94affe-6e94b015 VariantCopy 950->952 951->952 953 6e94b017-6e94b018 call 6e9ac1e0 952->953 954 6e94b01d-6e94b033 VariantClear 952->954 953->954 956 6e94b035-6e94b03a call 6e9ac1e0 954->956 957 6e94b03f-6e94b050 954->957 956->957 959 6e94b056-6e94b058 957->959 960 6e94b052-6e94b054 957->960 961 6e94b05b-6e94b05f 959->961 960->961 962 6e94b065 961->962 963 6e94b061-6e94b063 961->963 964 6e94b067-6e94b09a 962->964 963->964 1014 6e94b09d call 149d149 964->1014 1015 6e94b09d call 149d148 964->1015 965 6e94b09f-6e94b0a1 965->942 966 6e94b0a7-6e94b0b3 call 6e999bb5 965->966 969 6e94b0b5-6e94b0bf 966->969 970 6e94b0c1 966->970 971 6e94b0c3-6e94b0ca 969->971 970->971 972 6e94b0d0-6e94b0d9 971->972 972->972 973 6e94b0db-6e94b111 call 6e9991e1 call 6e99a136 972->973 978 6e94b113-6e94b118 call 6e9ac1e0 973->978 979 6e94b11d-6e94b12b 973->979 978->979 981 6e94b131-6e94b133 979->981 982 6e94b12d-6e94b12f 979->982 983 6e94b136-6e94b13a 981->983 982->983 984 6e94b140 983->984 985 6e94b13c-6e94b13e 983->985 986 6e94b142-6e94b17e 984->986 985->986 988 6e94b180-6e94b18a 986->988 989 6e94b1ff-6e94b203 986->989 992 6e94b190-6e94b1b9 SafeArrayGetLBound SafeArrayGetUBound 988->992 993 6e94b28d-6e94b2b8 VariantClear * 3 988->993 990 6e94b205-6e94b20e call 6e999c35 989->990 991 6e94b210-6e94b215 989->991 990->991 997 6e94b217-6e94b220 call 6e999c35 991->997 998 6e94b223-6e94b229 call 6e999b35 991->998 999 6e94b1bf-6e94b1cd SafeArrayAccessData 992->999 1000 6e94b28b 992->1000 995 6e94b2c2-6e94b2d0 993->995 996 6e94b2ba-6e94b2bf 993->996 1003 6e94b2d2-6e94b2d7 995->1003 1004 6e94b2da-6e94b2ee 995->1004 996->995 997->998 998->942 999->1000 1006 6e94b1d3-6e94b1f7 call 6e9991e1 call 6e99a530 SafeArrayUnaccessData 999->1006 1000->993 1003->1004 1006->1000 1013 6e94b1fd 1006->1013 1013->989 1014->965 1015->965 1016->941 1017->941
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E94AF75
                                                        • VariantInit.OLEAUT32(?), ref: 6E94AF7C
                                                        • VariantInit.OLEAUT32(?), ref: 6E94AF83
                                                        • VariantCopy.OLEAUT32(?,?), ref: 6E94B00D
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B027
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E94B19C
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E94B1AA
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 6E94B1C5
                                                        • _memmove.LIBCMT ref: 6E94B1E6
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 6E94B1EF
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B237
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B23E
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B245
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B29D
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B2A4
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B2AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArraySafe$Init$BoundData$AccessCopyUnaccess_memmove
                                                        • String ID:
                                                        • API String ID: 3403836469-0
                                                        • Opcode ID: c150c9ddc94ce6417053b2374e1d79fad2afda4a2079c08d1f02a048efe66c38
                                                        • Instruction ID: 49ed0142bbeacabb40a3e1ede245e11fdfc17cadb91968123866cea06d652b8c
                                                        • Opcode Fuzzy Hash: c150c9ddc94ce6417053b2374e1d79fad2afda4a2079c08d1f02a048efe66c38
                                                        • Instruction Fuzzy Hash: 78C145B26082429FD704DFA8C88495BB7F9FF99304F144A6DE659CB254E730E905CFA2

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1018 6e95d410-6e95d44c 1019 6e95d472-6e95d4e0 VariantInit * 3 1018->1019 1020 6e95d44e-6e95d465 1018->1020 1021 6e95d4e2-6e95d4ea 1019->1021 1022 6e95d4ec-6e95d4f2 1019->1022 1023 6e95d4f6-6e95d504 1021->1023 1022->1023 1024 6e95d506-6e95d50d 1023->1024 1025 6e95d51e-6e95d527 1023->1025 1028 6e95d514-6e95d516 1024->1028 1029 6e95d50f-6e95d512 1024->1029 1026 6e95d529-6e95d530 1025->1026 1027 6e95d538-6e95d53c 1025->1027 1026->1027 1031 6e95d532-6e95d536 1026->1031 1032 6e95d540-6e95d544 1027->1032 1030 6e95d518-6e95d51c 1028->1030 1029->1030 1030->1024 1030->1025 1031->1032 1033 6e95d704-6e95d72f VariantClear * 3 1032->1033 1034 6e95d54a-6e95d5c0 call 6e999d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1032->1034 1036 6e95d731-6e95d757 1033->1036 1037 6e95d76c-6e95d783 1033->1037 1042 6e95d5c6-6e95d5ea call 6e99a530 SafeArrayUnaccessData 1034->1042 1043 6e95d5c2-6e95d5c4 1034->1043 1039 6e95d470 1036->1039 1040 6e95d75d 1036->1040 1039->1019 1044 6e95d5ec-6e95d605 SafeArrayPutElement 1042->1044 1043->1044 1046 6e95d6e5-6e95d6eb 1044->1046 1047 6e95d60b-6e95d629 1044->1047 1051 6e95d6f6-6e95d6f8 1046->1051 1052 6e95d6ed-6e95d6f3 call 6e999d2c 1046->1052 1049 6e95d633-6e95d64f SafeArrayPutElement VariantClear 1047->1049 1050 6e95d62b-6e95d630 1047->1050 1049->1046 1054 6e95d655-6e95d664 1049->1054 1050->1049 1055 6e95d701 1051->1055 1056 6e95d6fa-6e95d6fb SafeArrayDestroy 1051->1056 1052->1051 1058 6e95d762-6e95d767 call 6e9ac1e0 1054->1058 1059 6e95d66a-6e95d694 1054->1059 1055->1033 1056->1055 1058->1037 1071 6e95d697 call 149d149 1059->1071 1072 6e95d697 call 149d148 1059->1072 1061 6e95d699-6e95d69b 1061->1046 1062 6e95d69d-6e95d6a9 1061->1062 1062->1046 1063 6e95d6ab-6e95d6c1 call 6e94db30 1062->1063 1063->1046 1066 6e95d6c3-6e95d6e0 call 6e9556b0 call 6e956880 1063->1066 1066->1046 1071->1061 1072->1061
                                                        APIs
                                                        • VariantInit.OLEAUT32 ref: 6E95D4B3
                                                        • VariantInit.OLEAUT32 ref: 6E95D4C5
                                                        • VariantInit.OLEAUT32(?), ref: 6E95D4CC
                                                        • _malloc.LIBCMT ref: 6E95D551
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E95D58B
                                                        • SafeArrayCreateVector.OLEAUT32 ref: 6E95D5A6
                                                        • SafeArrayAccessData.OLEAUT32 ref: 6E95D5B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayInitSafeVariant$CreateVector$AccessData_malloc
                                                        • String ID:
                                                        • API String ID: 1552365394-0
                                                        • Opcode ID: 9696ff04e29100f8a749d48338bf5ecc206d2f1a27a8041e0579d86cf23f5f83
                                                        • Instruction ID: 8d5c1f898373db56aaa4ee72ed95e26002942da4d61edf98241cb49091d45689
                                                        • Opcode Fuzzy Hash: 9696ff04e29100f8a749d48338bf5ecc206d2f1a27a8041e0579d86cf23f5f83
                                                        • Instruction Fuzzy Hash: B8B123B66083019FD314CFA8C880A5BB7E9FF99314F14895DE8999B351E731E906CF92

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1073 6e95d468 1074 6e95d470-6e95d4e0 VariantInit * 3 1073->1074 1076 6e95d4e2-6e95d4ea 1074->1076 1077 6e95d4ec-6e95d4f2 1074->1077 1078 6e95d4f6-6e95d504 1076->1078 1077->1078 1079 6e95d506-6e95d50d 1078->1079 1080 6e95d51e-6e95d527 1078->1080 1083 6e95d514-6e95d516 1079->1083 1084 6e95d50f-6e95d512 1079->1084 1081 6e95d529-6e95d530 1080->1081 1082 6e95d538-6e95d53c 1080->1082 1081->1082 1086 6e95d532-6e95d536 1081->1086 1087 6e95d540-6e95d544 1082->1087 1085 6e95d518-6e95d51c 1083->1085 1084->1085 1085->1079 1085->1080 1086->1087 1088 6e95d704-6e95d72f VariantClear * 3 1087->1088 1089 6e95d54a-6e95d5c0 call 6e999d66 SafeArrayCreateVector * 2 SafeArrayAccessData 1087->1089 1091 6e95d731-6e95d757 1088->1091 1092 6e95d76c-6e95d783 1088->1092 1096 6e95d5c6-6e95d5ea call 6e99a530 SafeArrayUnaccessData 1089->1096 1097 6e95d5c2-6e95d5c4 1089->1097 1091->1074 1094 6e95d75d 1091->1094 1098 6e95d5ec-6e95d605 SafeArrayPutElement 1096->1098 1097->1098 1100 6e95d6e5-6e95d6eb 1098->1100 1101 6e95d60b-6e95d629 1098->1101 1105 6e95d6f6-6e95d6f8 1100->1105 1106 6e95d6ed-6e95d6f3 call 6e999d2c 1100->1106 1103 6e95d633-6e95d64f SafeArrayPutElement VariantClear 1101->1103 1104 6e95d62b-6e95d630 1101->1104 1103->1100 1108 6e95d655-6e95d664 1103->1108 1104->1103 1109 6e95d701 1105->1109 1110 6e95d6fa-6e95d6fb SafeArrayDestroy 1105->1110 1106->1105 1112 6e95d762-6e95d767 call 6e9ac1e0 1108->1112 1113 6e95d66a-6e95d694 1108->1113 1109->1088 1110->1109 1112->1092 1125 6e95d697 call 149d149 1113->1125 1126 6e95d697 call 149d148 1113->1126 1115 6e95d699-6e95d69b 1115->1100 1116 6e95d69d-6e95d6a9 1115->1116 1116->1100 1117 6e95d6ab-6e95d6c1 call 6e94db30 1116->1117 1117->1100 1120 6e95d6c3-6e95d6e0 call 6e9556b0 call 6e956880 1117->1120 1120->1100 1125->1115 1126->1115
                                                        APIs
                                                        • VariantInit.OLEAUT32 ref: 6E95D4B3
                                                        • VariantInit.OLEAUT32 ref: 6E95D4C5
                                                        • VariantInit.OLEAUT32(?), ref: 6E95D4CC
                                                        • _malloc.LIBCMT ref: 6E95D551
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E95D58B
                                                        • SafeArrayCreateVector.OLEAUT32 ref: 6E95D5A6
                                                        • SafeArrayAccessData.OLEAUT32 ref: 6E95D5B8
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95D601
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95D63E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$InitVariant$CreateElementVector$AccessData_malloc
                                                        • String ID:
                                                        • API String ID: 2723946344-0
                                                        • Opcode ID: fa12a8d2eeb4823809285ddd461739e7bd97cf46ce4f0710e0060b39c3f70cf0
                                                        • Instruction ID: 9a0451654b52be5dd5510e51ce929e7ae43ef347f2a227345c0991fa40b77b42
                                                        • Opcode Fuzzy Hash: fa12a8d2eeb4823809285ddd461739e7bd97cf46ce4f0710e0060b39c3f70cf0
                                                        • Instruction Fuzzy Hash: 0E9123B56083019FD314CFA8C880A5BB7E9BF89304F14895DE9958B351E770E946CF92

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1127 6e955140-6e9551a8 VariantInit call 6e962820 1130 6e9551ae-6e9551ed SafeArrayCreateVector * 2 SafeArrayAccessData 1127->1130 1131 6e955339-6e95533e 1127->1131 1132 6e9551f3-6e955218 call 6e99a530 SafeArrayUnaccessData 1130->1132 1133 6e9551ef-6e9551f1 1130->1133 1134 6e955340-6e955346 call 6e999d2c 1131->1134 1135 6e955349-6e95534b 1131->1135 1138 6e95521a-6e955230 SafeArrayPutElement 1132->1138 1133->1138 1134->1135 1136 6e955354-6e955372 VariantClear 1135->1136 1137 6e95534d-6e95534e SafeArrayDestroy 1135->1137 1137->1136 1138->1131 1143 6e955236-6e955250 1138->1143 1144 6e955252-6e955257 1143->1144 1145 6e95525a-6e955276 SafeArrayPutElement VariantClear 1143->1145 1144->1145 1145->1131 1146 6e95527c-6e95529a 1145->1146 1147 6e9552a4-6e9552c0 SafeArrayPutElement VariantClear 1146->1147 1148 6e95529c-6e95529f 1146->1148 1147->1131 1149 6e9552c2-6e9552d6 SafeArrayPutElement 1147->1149 1148->1147 1149->1131 1150 6e9552d8-6e9552e3 1149->1150 1151 6e9552e5-6e9552ea call 6e9ac1e0 1150->1151 1152 6e9552ef-6e95531a 1150->1152 1151->1152 1157 6e95531b call 149d149 1152->1157 1158 6e95531b call 149d148 1152->1158 1154 6e95531d-6e95531f 1154->1131 1155 6e955321-6e955333 1154->1155 1155->1131 1156 6e955335 1155->1156 1156->1131 1157->1154 1158->1154
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E955177
                                                          • Part of subcall function 6E962820: _malloc.LIBCMT ref: 6E962871
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000004), ref: 6E9551B9
                                                        • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 6E9551D5
                                                        • SafeArrayAccessData.OLEAUT32(00000000,00000000), ref: 6E9551E5
                                                        • _memmove.LIBCMT ref: 6E9551FF
                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E955208
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E95522C
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6E955263
                                                        • VariantClear.OLEAUT32(?), ref: 6E95526C
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 6E9552AD
                                                        • VariantClear.OLEAUT32(?), ref: 6E9552B6
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000002,00000002), ref: 6E9552D2
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E95534E
                                                        • VariantClear.OLEAUT32(?), ref: 6E955358
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$ElementVariant$Clear$CreateDataVector$AccessDestroyInitUnaccess_malloc_memmove
                                                        • String ID:
                                                        • API String ID: 452649785-0
                                                        • Opcode ID: c21ba0d9fb5ea7024da08d72a71577d759310a10d1fd2cde17525b5db3124efd
                                                        • Instruction ID: 6380ee2998c611cf1585923add77773b233a5d8151507e478196a47353db5517
                                                        • Opcode Fuzzy Hash: c21ba0d9fb5ea7024da08d72a71577d759310a10d1fd2cde17525b5db3124efd
                                                        • Instruction Fuzzy Hash: 3E71F9B1A0061AEBDB00DFA5C884AEFBBB8FF59304F108119E9159B241E774E955CBA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1159 6e9544c0-6e954538 VariantInit * 2 SafeArrayCreateVector 1160 6e954542-6e954564 SafeArrayPutElement VariantClear 1159->1160 1161 6e95453a-6e95453d 1159->1161 1162 6e95476f-6e954774 1160->1162 1163 6e95456a-6e954598 SafeArrayCreateVector SafeArrayPutElement 1160->1163 1161->1160 1164 6e954776-6e954777 SafeArrayDestroy 1162->1164 1165 6e95477d-6e95479b VariantClear * 2 1162->1165 1163->1162 1166 6e95459e-6e9545b9 SafeArrayPutElement 1163->1166 1164->1165 1167 6e9547b0-6e9547c4 1165->1167 1168 6e95479d-6e9547ad 1165->1168 1166->1162 1169 6e9545bf-6e9545d2 SafeArrayPutElement 1166->1169 1168->1167 1169->1162 1170 6e9545d8-6e9545e3 1169->1170 1171 6e9545e5-6e9545ea call 6e9ac1e0 1170->1171 1172 6e9545ef-6e954604 1170->1172 1171->1172 1172->1162 1175 6e95460a-6e954615 1172->1175 1175->1162 1176 6e95461b-6e95469f 1175->1176 1183 6e9546a1-6e95471f 1176->1183 1189 6e954721-6e954758 1183->1189 1192 6e95475f-6e95476a call 6e95de60 1189->1192 1193 6e95475a call 6e99919e 1189->1193 1195 6e95476c 1192->1195 1193->1192 1195->1162
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E9544FF
                                                        • VariantInit.OLEAUT32(?), ref: 6E954505
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E954516
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E954551
                                                        • VariantClear.OLEAUT32(?), ref: 6E95455A
                                                        • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 6E954579
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E954594
                                                        • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 6E9545B5
                                                        • SafeArrayPutElement.OLEAUT32(?,00000000,?), ref: 6E9545CE
                                                        • std::tr1::_Xweak.LIBCPMT ref: 6E95475A
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E954777
                                                        • VariantClear.OLEAUT32(?), ref: 6E954787
                                                        • VariantClear.OLEAUT32(?), ref: 6E95478D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$DestroyXweakstd::tr1::_
                                                        • String ID:
                                                        • API String ID: 1304965753-0
                                                        • Opcode ID: ff5244bc4c867e700305557c7dacb2deb3f19e9c66c7d6b502730c8f64f61b6a
                                                        • Instruction ID: 37555561fd8be0e24ff0c55c4fe10353783e83100fc79a369e7131fab2ab1d96
                                                        • Opcode Fuzzy Hash: ff5244bc4c867e700305557c7dacb2deb3f19e9c66c7d6b502730c8f64f61b6a
                                                        • Instruction Fuzzy Hash: 39A13C75A0020A9BDB54DBE8C984EAFB7B9BF88710F14462DE506EB784C630E941CF60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1197 6e95bf00-6e95bf6a VariantInit * 4 1198 6e95bf74-6e95bf86 1197->1198 1199 6e95bf6c-6e95bf71 1197->1199 1200 6e95bf90-6e95bfbb call 6e95c150 1198->1200 1201 6e95bf88-6e95bf8d 1198->1201 1199->1198 1204 6e95c0c4-6e95c0cd 1200->1204 1205 6e95bfc1-6e95bfdf call 6e95c150 1200->1205 1201->1200 1206 6e95c0e2-6e95c149 call 6e99a1f7 * 2 VariantClear * 4 call 6e99948b 1204->1206 1207 6e95c0cf-6e95c0df 1204->1207 1205->1204 1212 6e95bfe5-6e95c019 call 6e95dc40 1205->1212 1207->1206 1218 6e95c020-6e95c029 1212->1218 1219 6e95c01b-6e95c01e 1212->1219 1222 6e95c02e 1218->1222 1223 6e95c02b-6e95c02c 1218->1223 1221 6e95c035-6e95c037 call 6e9544c0 1219->1221 1226 6e95c03c-6e95c03e 1221->1226 1224 6e95c030-6e95c032 1222->1224 1223->1224 1224->1221 1226->1204 1228 6e95c044-6e95c05c VariantInit VariantCopy 1226->1228 1229 6e95c064-6e95c07a 1228->1229 1230 6e95c05e-6e95c05f call 6e9ac1e0 1228->1230 1229->1204 1233 6e95c07c-6e95c094 VariantInit VariantCopy 1229->1233 1230->1229 1234 6e95c096-6e95c097 call 6e9ac1e0 1233->1234 1235 6e95c09c-6e95c0af 1233->1235 1234->1235 1235->1204 1238 6e95c0b1-6e95c0c0 1235->1238 1238->1204
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Init$Clear$Copy
                                                        • String ID:
                                                        • API String ID: 3833040332-0
                                                        • Opcode ID: f553b9d26eafa249a2a447f912578450e2145bf83d9c412390e5fde1f3ec54e9
                                                        • Instruction ID: d199602a7ecbc2b70c2d81e59bc54b89f94e87e9ca1234232590a0a768b8d9d1
                                                        • Opcode Fuzzy Hash: f553b9d26eafa249a2a447f912578450e2145bf83d9c412390e5fde1f3ec54e9
                                                        • Instruction Fuzzy Hash: CB8127B1900619AFDF04DBE8C884AEEBBB9FF89304F144559E905AB340EB75E915CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1239 6e9564d0-6e956552 VariantInit * 3 SafeArrayCreateVector 1240 6e956554-6e956559 1239->1240 1241 6e95655c-6e95657e SafeArrayPutElement VariantClear 1239->1241 1240->1241 1242 6e956584-6e9565a1 1241->1242 1243 6e956661-6e956663 1241->1243 1244 6e9565a3-6e9565a6 1242->1244 1245 6e9565ab-6e9565c7 SafeArrayPutElement VariantClear 1242->1245 1246 6e956665-6e956666 SafeArrayDestroy 1243->1246 1247 6e95666c-6e95669d VariantClear * 3 1243->1247 1244->1245 1245->1243 1248 6e9565cd-6e9565db 1245->1248 1246->1247 1249 6e9565e7-6e956613 1248->1249 1250 6e9565dd-6e9565e2 call 6e9ac1e0 1248->1250 1262 6e956616 call 149d149 1249->1262 1263 6e956616 call 149d148 1249->1263 1250->1249 1252 6e956618-6e95661a 1252->1243 1253 6e95661c-6e956628 1252->1253 1253->1243 1254 6e95662a-6e95663c call 6e94db30 1253->1254 1254->1243 1257 6e95663e-6e956650 call 6e9556b0 call 6e956880 1254->1257 1261 6e956655-6e95665c 1257->1261 1261->1243 1262->1252 1263->1252
                                                        APIs
                                                        • VariantInit.OLEAUT32 ref: 6E95650C
                                                        • VariantInit.OLEAUT32(?), ref: 6E956519
                                                        • VariantInit.OLEAUT32(?), ref: 6E956520
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C), ref: 6E956531
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95656D
                                                        • VariantClear.OLEAUT32(?), ref: 6E956576
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E9565B6
                                                        • VariantClear.OLEAUT32(?), ref: 6E9565BF
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E956666
                                                        • VariantClear.OLEAUT32(?), ref: 6E956677
                                                        • VariantClear.OLEAUT32(?), ref: 6E95667E
                                                        • VariantClear.OLEAUT32(?), ref: 6E956685
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                                        • String ID:
                                                        • API String ID: 1625659656-0
                                                        • Opcode ID: 9b19496333f3e4ed08710ab581d645777145f4846ea499b364880d9f30758592
                                                        • Instruction ID: 7b04bded68ac21463490a57feafd7a1e3ee2cb9180a1b5b500f4c1cf7e5badc2
                                                        • Opcode Fuzzy Hash: 9b19496333f3e4ed08710ab581d645777145f4846ea499b364880d9f30758592
                                                        • Instruction Fuzzy Hash: F35127B25187059FC700DFA8C880A5BBBE8EFD9710F00891EF9558B251EB71E906CF92

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1264 6e95cb90-6e95cc11 VariantInit * 2 SafeArrayCreateVector * 2 SafeArrayPutElement 1265 6e95cce7-6e95cce9 1264->1265 1266 6e95cc17-6e95cc4b SafeArrayPutElement VariantClear 1264->1266 1267 6e95ccf2-6e95cd18 VariantClear * 2 1265->1267 1268 6e95cceb-6e95ccec SafeArrayDestroy 1265->1268 1266->1265 1269 6e95cc51-6e95cc61 SafeArrayPutElement 1266->1269 1268->1267 1269->1265 1270 6e95cc67-6e95cc7b SafeArrayPutElement 1269->1270 1270->1265 1271 6e95cc7d-6e95cc8e 1270->1271 1272 6e95cc90-6e95cc95 call 6e9ac1e0 1271->1272 1273 6e95cc9a-6e95ccc8 1271->1273 1272->1273 1278 6e95ccc9 call 149d149 1273->1278 1279 6e95ccc9 call 149d148 1273->1279 1275 6e95cccb-6e95cccd 1275->1265 1276 6e95cccf-6e95cce1 1275->1276 1276->1265 1277 6e95cce3 1276->1277 1277->1265 1278->1275 1279->1275
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E95CBCA
                                                        • VariantInit.OLEAUT32(?), ref: 6E95CBD3
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E95CBE4
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E95CBF6
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95CC0D
                                                        • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6E95CC39
                                                        • VariantClear.OLEAUT32(?), ref: 6E95CC42
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6E95CC5D
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000001,?), ref: 6E95CC77
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E95CCEC
                                                        • VariantClear.OLEAUT32(?), ref: 6E95CCFC
                                                        • VariantClear.OLEAUT32(?), ref: 6E95CD02
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Variant$Element$Clear$CreateInitVector$Destroy
                                                        • String ID:
                                                        • API String ID: 3548156019-0
                                                        • Opcode ID: 1b7f6f502bc79fbc183bfb1b6afdc4bbce7ac6f4edc3db90cd49e3963c82dcf4
                                                        • Instruction ID: 4a1d2f4ad1a525fde229dee201a5c3bb61d7f731595bc84ca6a039f680cdf10b
                                                        • Opcode Fuzzy Hash: 1b7f6f502bc79fbc183bfb1b6afdc4bbce7ac6f4edc3db90cd49e3963c82dcf4
                                                        • Instruction Fuzzy Hash: A8514FB5D0420A9FDB00DFA4C880EDEBBB8FF59710F04855AEA15AB340D770A905CFA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1280 6e94a350-6e94a3bd VariantInit * 3 call 6e9538e0 1283 6e94a505-6e94a528 VariantClear * 3 1280->1283 1284 6e94a3c3-6e94a3d6 1280->1284 1285 6e94a532-6e94a546 1283->1285 1286 6e94a52a-6e94a52d 1283->1286 1287 6e94a3e0-6e94a3f7 VariantCopy 1284->1287 1288 6e94a3d8-6e94a3dd 1284->1288 1286->1285 1289 6e94a3ff-6e94a411 VariantClear 1287->1289 1290 6e94a3f9-6e94a3fa call 6e9ac1e0 1287->1290 1288->1287 1291 6e94a413-6e94a418 call 6e9ac1e0 1289->1291 1292 6e94a41d-6e94a42b 1289->1292 1290->1289 1291->1292 1295 6e94a431-6e94a433 1292->1295 1296 6e94a42d-6e94a42f 1292->1296 1297 6e94a436-6e94a43a 1295->1297 1296->1297 1298 6e94a440 1297->1298 1299 6e94a43c-6e94a43e 1297->1299 1300 6e94a442-6e94a477 1298->1300 1299->1300 1318 6e94a47a call 149d149 1300->1318 1319 6e94a47a call 149d148 1300->1319 1301 6e94a47c-6e94a47e 1301->1283 1302 6e94a484-6e94a493 1301->1302 1303 6e94a495-6e94a49a call 6e9ac1e0 1302->1303 1304 6e94a49f-6e94a4b0 1302->1304 1303->1304 1305 6e94a4b6-6e94a4b8 1304->1305 1306 6e94a4b2-6e94a4b4 1304->1306 1308 6e94a4bb-6e94a4bf 1305->1308 1306->1308 1309 6e94a4c5 1308->1309 1310 6e94a4c1-6e94a4c3 1308->1310 1311 6e94a4c7-6e94a4fc 1309->1311 1310->1311 1316 6e94a4ff call 149d149 1311->1316 1317 6e94a4ff call 149d148 1311->1317 1312 6e94a501-6e94a503 1312->1283 1313 6e94a549-6e94a578 VariantClear * 3 1312->1313 1314 6e94a582-6e94a596 1313->1314 1315 6e94a57a-6e94a57f 1313->1315 1315->1314 1316->1312 1317->1312 1318->1301 1319->1301
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$Init$Copy
                                                        • String ID:
                                                        • API String ID: 3214764494-0
                                                        • Opcode ID: 86deee5680b066050b167e6a1a87a459e18bd385780833b12e751509b7855eeb
                                                        • Instruction ID: fe61af998048ad9689f7110dcf148ce5edc54e096e640f58dca8ce5c2f46140c
                                                        • Opcode Fuzzy Hash: 86deee5680b066050b167e6a1a87a459e18bd385780833b12e751509b7855eeb
                                                        • Instruction Fuzzy Hash: 367134726083459FD300DFA9C880A5BB7E8AF99714F008A6DFA55CB390E770E905CF62

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1374 6e95cd20-6e95cd97 VariantInit * 3 SafeArrayCreateVector 1375 6e95cda1-6e95cdc0 SafeArrayPutElement VariantClear 1374->1375 1376 6e95cd99-6e95cd9c 1374->1376 1377 6e95cdc6-6e95cdd1 1375->1377 1378 6e95d2a0-6e95d2a2 1375->1378 1376->1375 1381 6e95cdd3-6e95cdd8 call 6e9ac1e0 1377->1381 1382 6e95cddd-6e95cdef 1377->1382 1379 6e95d2a4-6e95d2a5 SafeArrayDestroy 1378->1379 1380 6e95d2ab-6e95d2d7 VariantClear * 3 1378->1380 1379->1380 1381->1382 1382->1378 1385 6e95cdf5-6e95ce01 1382->1385 1385->1378 1386 6e95ce07-6e95cea4 1385->1386 1394 6e95cea6-6e95ceb7 1386->1394 1395 6e95ceba-6e95cf2b 1386->1395 1394->1395 1401 6e95cf41-6e95d222 1395->1401 1402 6e95cf2d-6e95cf3e 1395->1402 1437 6e95d224-6e95d229 call 6e9ac1e0 1401->1437 1438 6e95d22e-6e95d25c 1401->1438 1402->1401 1437->1438 1441 6e95d29d 1438->1441 1442 6e95d25e-6e95d269 1438->1442 1441->1378 1442->1441 1443 6e95d26b-6e95d27b call 6e94db30 1442->1443 1443->1441 1446 6e95d27d-6e95d28d call 6e9556b0 call 6e956880 1443->1446 1450 6e95d292-6e95d299 1446->1450 1450->1441
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E95CD5C
                                                        • VariantInit.OLEAUT32(?), ref: 6E95CD65
                                                        • VariantInit.OLEAUT32(?), ref: 6E95CD6B
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95CD76
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95CDAA
                                                        • VariantClear.OLEAUT32(?), ref: 6E95CDB7
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E95D2A5
                                                        • VariantClear.OLEAUT32(?), ref: 6E95D2B5
                                                        • VariantClear.OLEAUT32(?), ref: 6E95D2BB
                                                        • VariantClear.OLEAUT32(?), ref: 6E95D2C1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                                        • String ID:
                                                        • API String ID: 2515392200-0
                                                        • Opcode ID: d1bf9abca8ac93de9bb3262bd0fa803174ba9cbc02fcb52d6089e30b1800b91c
                                                        • Instruction ID: a0e62530217ee565e93edf015182c51d3cec62ec0222a9cdc96cadb795cc1450
                                                        • Opcode Fuzzy Hash: d1bf9abca8ac93de9bb3262bd0fa803174ba9cbc02fcb52d6089e30b1800b91c
                                                        • Instruction Fuzzy Hash: 4112E475A15706AFC758DBD8DD84DAAB3B9BF8D300F144668F50AABB91CA30F841CB50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1451 6e9566a0-6e956725 VariantInit * 2 SafeArrayCreateVector 1452 6e956727-6e95672a 1451->1452 1453 6e95672f-6e95674f SafeArrayPutElement VariantClear 1451->1453 1452->1453 1454 6e956755-6e956772 1453->1454 1455 6e956844-6e956846 1453->1455 1458 6e956774-6e956779 1454->1458 1459 6e95677c-6e95679c SafeArrayPutElement VariantClear 1454->1459 1456 6e95684f-6e956878 VariantClear * 2 1455->1456 1457 6e956848-6e956849 SafeArrayDestroy 1455->1457 1457->1456 1458->1459 1459->1455 1460 6e9567a2-6e9567b0 1459->1460 1461 6e9567b2-6e9567b7 call 6e9ac1e0 1460->1461 1462 6e9567bc-6e9567ef 1460->1462 1461->1462 1474 6e9567f2 call 149d149 1462->1474 1475 6e9567f2 call 149d148 1462->1475 1464 6e9567f4-6e9567f6 1464->1455 1465 6e9567f8-6e956805 1464->1465 1465->1455 1466 6e956807-6e95681c call 6e94db30 1465->1466 1466->1455 1469 6e95681e-6e95683f call 6e9556b0 call 6e956880 1466->1469 1469->1455 1474->1464 1475->1464
                                                        APIs
                                                        • VariantInit.OLEAUT32 ref: 6E9566DB
                                                        • VariantInit.OLEAUT32 ref: 6E9566EA
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E956700
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95673A
                                                        • VariantClear.OLEAUT32(?), ref: 6E956747
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E956787
                                                        • VariantClear.OLEAUT32(?), ref: 6E956794
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E956849
                                                        • VariantClear.OLEAUT32(?), ref: 6E95685A
                                                        • VariantClear.OLEAUT32(?), ref: 6E956861
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArrayClearSafe$ElementInit$CreateDestroyVector
                                                        • String ID:
                                                        • API String ID: 551789342-0
                                                        • Opcode ID: 2a187d62fbc25a3a86014ba1e200b97eba074adde4749578b121a50f38adb2d5
                                                        • Instruction ID: f363936a3c32418ba4848efd62b9cdaf6174cdfd3aaadd8744d6353c3ba1d48e
                                                        • Opcode Fuzzy Hash: 2a187d62fbc25a3a86014ba1e200b97eba074adde4749578b121a50f38adb2d5
                                                        • Instruction Fuzzy Hash: AE514576508606AFCB00CFA4C844A9BBBE9EFD9714F008A19F9559B351E730E905CFA2

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1476 6e95840e-6e958413 call 6e9ac1e0 1478 6e958418-6e95841f 1476->1478 1566 6e958422 call 149d149 1478->1566 1567 6e958422 call 149d148 1478->1567 1479 6e958424-6e958426 1480 6e95ae53-6e95ae60 1479->1480 1481 6e95842c-6e958443 call 6e94dfb0 1479->1481 1483 6e95ae62-6e95ae65 SafeArrayDestroy 1480->1483 1484 6e95ae68-6e95ae70 1480->1484 1481->1480 1490 6e958449-6e958454 1481->1490 1483->1484 1485 6e95ae72-6e95ae75 SafeArrayDestroy 1484->1485 1486 6e95ae7b-6e95ae83 1484->1486 1485->1486 1488 6e95ae85-6e95ae88 SafeArrayDestroy 1486->1488 1489 6e95ae8e-6e95ae96 1486->1489 1488->1489 1491 6e95aea1-6e95aea9 1489->1491 1492 6e95ae98-6e95ae9b SafeArrayDestroy 1489->1492 1493 6e958464-6e95846f 1490->1493 1494 6e958456-6e958461 1490->1494 1495 6e95aeb4-6e95aebc 1491->1495 1496 6e95aeab-6e95aeae SafeArrayDestroy 1491->1496 1492->1491 1497 6e958471-6e95847c 1493->1497 1498 6e95847f-6e958487 1493->1498 1494->1493 1499 6e95aec7-6e95aed3 1495->1499 1500 6e95aebe-6e95aec1 SafeArrayDestroy 1495->1500 1496->1495 1497->1498 1501 6e958493-6e9584a9 1498->1501 1502 6e958489-6e95848e call 6e9ac1e0 1498->1502 1503 6e95aed5-6e95aeda 1499->1503 1504 6e95aedd-6e95aef8 call 6e99948b 1499->1504 1500->1499 1501->1480 1508 6e9584af-6e9584e7 SafeArrayGetLBound SafeArrayGetUBound 1501->1508 1502->1501 1503->1504 1510 6e958616-6e95862d call 6e94dfb0 1508->1510 1511 6e9584ed-6e958512 SafeArrayGetElement 1508->1511 1510->1480 1519 6e958633-6e95864d call 6e94dfb0 1510->1519 1512 6e958758-6e958761 1511->1512 1513 6e958518-6e958523 1511->1513 1512->1480 1518 6e958767-6e95876f 1512->1518 1516 6e958525-6e958528 1513->1516 1517 6e95852d-6e95853b 1513->1517 1516->1517 1520 6e958545-6e95855a 1517->1520 1521 6e95853d-6e958542 1517->1521 1518->1480 1519->1480 1528 6e958653-6e95866d call 6e94dfb0 1519->1528 1523 6e958564-6e958582 call 6e953a90 1520->1523 1524 6e95855c-6e958561 1520->1524 1521->1520 1531 6e958584-6e95858d 1523->1531 1532 6e95858f-6e9585ab call 6e953a90 1523->1532 1524->1523 1528->1480 1538 6e958673-6e95868c call 6e94dfb0 1528->1538 1533 6e9585b6-6e9585b9 call 6e94ad80 1531->1533 1539 6e9585ad-6e9585b0 1532->1539 1540 6e9585be-6e9585f6 call 6e99a1f7 * 2 1532->1540 1533->1540 1538->1480 1545 6e958692-6e9586ac call 6e94dfb0 1538->1545 1539->1533 1550 6e958600-6e958610 1540->1550 1551 6e9585f8-6e9585fd 1540->1551 1545->1480 1552 6e9586b2-6e9586d1 call 6e9569c0 1545->1552 1550->1510 1550->1511 1551->1550 1552->1480 1555 6e9586d7-6e9586f7 call 6e9569c0 1552->1555 1555->1480 1558 6e9586fd-6e95870b 1555->1558 1559 6e958715-6e958753 call 6e9569c0 call 6e99a1f7 1558->1559 1560 6e95870d-6e958712 1558->1560 1559->1480 1560->1559 1566->1479 1567->1479
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E9584BF
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E9584D2
                                                        • SafeArrayGetElement.OLEAUT32 ref: 6E95850A
                                                          • Part of subcall function 6E953A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E953B71
                                                          • Part of subcall function 6E953A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E953B83
                                                          • Part of subcall function 6E9569C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E956A08
                                                          • Part of subcall function 6E9569C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E956A15
                                                          • Part of subcall function 6E9569C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E956A41
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                          • Part of subcall function 6E94DFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E94DFF6
                                                          • Part of subcall function 6E94DFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E94E003
                                                          • Part of subcall function 6E94DFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E94E02F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Bound$Destroy$Element
                                                        • String ID:
                                                        • API String ID: 959723449-0
                                                        • Opcode ID: c477648a8f9492cdec8f2c61d2348547638dd73bb929dec49f49b6a6302433a5
                                                        • Instruction ID: 47ae46d190bd3246fb6dbb2aa893da5b1f046accc0a2d8a8dda90d67142eb275
                                                        • Opcode Fuzzy Hash: c477648a8f9492cdec8f2c61d2348547638dd73bb929dec49f49b6a6302433a5
                                                        • Instruction Fuzzy Hash: 92C14D70A002059FDB54DFA8CC90FADB7BDAF88304F204598E919AB386D771E945CF54
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E9541AF
                                                        • VariantInit.OLEAUT32(?), ref: 6E9541B5
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E9541C0
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E9541F5
                                                        • VariantClear.OLEAUT32(?), ref: 6E954201
                                                        • std::tr1::_Xweak.LIBCPMT ref: 6E954450
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95446D
                                                        • VariantClear.OLEAUT32(?), ref: 6E95447D
                                                        • VariantClear.OLEAUT32(?), ref: 6E954483
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                                        • String ID:
                                                        • API String ID: 1774866819-0
                                                        • Opcode ID: a9c33b29b0304fd8c5240fdba2be13343f2cf702bd1d2211fa829754e9073297
                                                        • Instruction ID: 760bee00cf5acbe6c809a9e332ea0b1b42636131bec06ed4afcf94d6c4a1e463
                                                        • Opcode Fuzzy Hash: a9c33b29b0304fd8c5240fdba2be13343f2cf702bd1d2211fa829754e9073297
                                                        • Instruction Fuzzy Hash: F9B12675604609AFCB54DF98C884DEAB7FABF8D310F158568E50AAB790DA34F841CF60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E95C88F
                                                        • VariantInit.OLEAUT32(?), ref: 6E95C895
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95C8A0
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E95C8D5
                                                        • VariantClear.OLEAUT32(?), ref: 6E95C8E1
                                                        • std::tr1::_Xweak.LIBCPMT ref: 6E95CB1C
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95CB39
                                                        • VariantClear.OLEAUT32(?), ref: 6E95CB49
                                                        • VariantClear.OLEAUT32(?), ref: 6E95CB4F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                                        • String ID:
                                                        • API String ID: 1774866819-0
                                                        • Opcode ID: 5697bfe0b8233956ccf7aa58344c22d5d7b80674323679effd07016b8e5d4205
                                                        • Instruction ID: 167c82f370498e78f5da131acc304886c22ae628478d438423ea3efd72c933d3
                                                        • Opcode Fuzzy Hash: 5697bfe0b8233956ccf7aa58344c22d5d7b80674323679effd07016b8e5d4205
                                                        • Instruction Fuzzy Hash: 72B11775A00609AFCB14DF98C884DEAB7F9BF8D310F158569E606AB791DA34F841CF60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E95C56F
                                                        • VariantInit.OLEAUT32(?), ref: 6E95C575
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95C580
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E95C5B5
                                                        • VariantClear.OLEAUT32(?), ref: 6E95C5C1
                                                        • std::tr1::_Xweak.LIBCPMT ref: 6E95C7D4
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95C7F1
                                                        • VariantClear.OLEAUT32(?), ref: 6E95C801
                                                        • VariantClear.OLEAUT32(?), ref: 6E95C807
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArrayClearSafe$Init$CreateDestroyElementVectorXweakstd::tr1::_
                                                        • String ID:
                                                        • API String ID: 1774866819-0
                                                        • Opcode ID: 530bfa129fb6324d4d09f5d73c1a3c21b484d6ec0b24baf384b68cf3f4525f52
                                                        • Instruction ID: ceb68ec60eb8190f067fba6970bdf486c44d3e5fb3403a22b5419e3317717047
                                                        • Opcode Fuzzy Hash: 530bfa129fb6324d4d09f5d73c1a3c21b484d6ec0b24baf384b68cf3f4525f52
                                                        • Instruction Fuzzy Hash: 0EA13775A046099FCB14DFA8C884DEAB7B9BF8D310F14856CE506ABB90DA34F841CF60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E9568B2
                                                        • VariantInit.OLEAUT32(?), ref: 6E9568BD
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E9568D7
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E9568FD
                                                        • VariantClear.OLEAUT32(?), ref: 6E956909
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E956923
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E956981
                                                        • VariantClear.OLEAUT32(?), ref: 6E95699E
                                                        • VariantClear.OLEAUT32(?), ref: 6E9569A4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArraySafe$Clear$ElementInit$CreateDestroyVector
                                                        • String ID:
                                                        • API String ID: 3529038988-0
                                                        • Opcode ID: 4729a6ebaa3c2d0ec656ac6cbc6818cb884c326330119c916aa3d1d19dbb3e82
                                                        • Instruction ID: bd1424a5ab7942a554524e664391e5fa23b37c3d0fd6c88f7eea7c1c29ecc7c7
                                                        • Opcode Fuzzy Hash: 4729a6ebaa3c2d0ec656ac6cbc6818cb884c326330119c916aa3d1d19dbb3e82
                                                        • Instruction Fuzzy Hash: 4B412CB2900619AFDB00DFA5C844AEFBBB8EF99314F144119E905A7341E775E906CFA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID:
                                                        • API String ID: 2610073882-0
                                                        • Opcode ID: 7d865bc034583f9adb607b4e5d5ccb9327259141ebf5bc701dcab594318491cc
                                                        • Instruction ID: 8731a119e35639db5acb22d50148ee9395b9f84113442622f161ecf1bca46793
                                                        • Opcode Fuzzy Hash: 7d865bc034583f9adb607b4e5d5ccb9327259141ebf5bc701dcab594318491cc
                                                        • Instruction Fuzzy Hash: 59C136B1608701DFD300DFA9C88095AB7E9BFC9304F248A4DE9949B365D775E849CF92
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 6E956C8B
                                                        • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 6E956CA6
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6E956CC7
                                                          • Part of subcall function 6E955760: std::tr1::_Xweak.LIBCPMT ref: 6E955769
                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E956CF9
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E956F13
                                                        • InterlockedCompareExchange.KERNEL32(6E9DC6A4,45524548,4B4F4F4C), ref: 6E956F34
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                                        • String ID:
                                                        • API String ID: 2722669376-0
                                                        • Opcode ID: d8fd73754f34a3ddf67799db44f17c81b793d591a12567e69ba4722bbd7ee399
                                                        • Instruction ID: e3123eb035c9e439eeddeac9e59b4c18b50221b948bba0316cb4f115d9e1373f
                                                        • Opcode Fuzzy Hash: d8fd73754f34a3ddf67799db44f17c81b793d591a12567e69ba4722bbd7ee399
                                                        • Instruction Fuzzy Hash: 87D1B0B1A102099FDB01CFE4C890BEE77BCAF95304F148869E909AB381D774E954CFA1
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::tr1::_Xweak.LIBCPMT ref: 6E941B53
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E941B5D
                                                        • std::exception::exception.LIBCMT ref: 6E941C43
                                                        • __CxxThrowException@8.LIBCMT ref: 6E941C58
                                                        Strings
                                                        • invalid vector<T> subscript, xrefs: 6E941B58
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8ThrowXinvalid_argumentXweak_mallocstd::_std::exception::exceptionstd::tr1::_
                                                        • String ID: invalid vector<T> subscript
                                                        • API String ID: 3098024973-3016609489
                                                        • Opcode ID: 5e1eb879702312fdcfcd4e7d7b3b84ad7e79ba1b1479cc87cda31c42bcbeb907
                                                        • Instruction ID: 2febbd9658137b54d7a3c68e4652b4ebb38febfd42f6c571d3d554cd4bd0980b
                                                        • Opcode Fuzzy Hash: 5e1eb879702312fdcfcd4e7d7b3b84ad7e79ba1b1479cc87cda31c42bcbeb907
                                                        • Instruction Fuzzy Hash: 1B2205B1800709DFCB14DFE4C4909DEBBF9BF84314F148A59D55AAB254E734AA88CF90
                                                        APIs
                                                        • VariantInit.OLEAUT32(6E9531EC), ref: 6E94DB5E
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E94DB6E
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E94DB82
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E94DBF1
                                                        • VariantClear.OLEAUT32(?), ref: 6E94DBFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Variant$ClearCreateDestroyElementInitVector
                                                        • String ID:
                                                        • API String ID: 182531043-0
                                                        • Opcode ID: d295c53225649e6d487eb242177c423335022f2690fa7b30565e1733f995ce6b
                                                        • Instruction ID: a05d415326808a48d1513d72ba5ddbe8405522b9236168858989d0b9a2c14c2d
                                                        • Opcode Fuzzy Hash: d295c53225649e6d487eb242177c423335022f2690fa7b30565e1733f995ce6b
                                                        • Instruction Fuzzy Hash: 21316F7AA04605EFD701DF95C944EEBB7B9EF9A710F11815AE911AB340D734E901CFA0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: T@12
                                                        • String ID: a0
                                                        • API String ID: 456891419-3188653782
                                                        • Opcode ID: a43b3d3eb80cf9c245e6dc0779ae73b8d41b723c948179220d809934c0f85ab4
                                                        • Instruction ID: 78ebb761431437e37931dd2a4e3a448f38f7632646ed537d744ef43736c0ca15
                                                        • Opcode Fuzzy Hash: a43b3d3eb80cf9c245e6dc0779ae73b8d41b723c948179220d809934c0f85ab4
                                                        • Instruction Fuzzy Hash: 3411F170D102536ADB709AF64C5CFAF7BBCDF85754F049814A425E6284D7A4C541EE60
                                                        APIs
                                                        • _malloc.LIBCMT ref: 6E999BCF
                                                          • Part of subcall function 6E999D66: __FF_MSGBANNER.LIBCMT ref: 6E999D7F
                                                          • Part of subcall function 6E999D66: __NMSG_WRITE.LIBCMT ref: 6E999D86
                                                          • Part of subcall function 6E999D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6E999BD4,6E931290,64F62E83), ref: 6E999DAB
                                                        • std::exception::exception.LIBCMT ref: 6E999C04
                                                        • std::exception::exception.LIBCMT ref: 6E999C1E
                                                        • __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                                        • String ID:
                                                        • API String ID: 615853336-0
                                                        • Opcode ID: 71c75d752d054b6d1535de24d739fbd647acdb658e9ec57816cc8ab3d3e600d9
                                                        • Instruction ID: 80806e7059917ee602a89d4a416d372485290c3acb1b7014040a6c946b0f1917
                                                        • Opcode Fuzzy Hash: 71c75d752d054b6d1535de24d739fbd647acdb658e9ec57816cc8ab3d3e600d9
                                                        • Instruction Fuzzy Hash: 9EF0A435400A59AFDF44EBE5CC55ADE7AFCAF9271CF0C0819E4009A294FB75CA41BE51
                                                        APIs
                                                        • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 6E946C73
                                                        • SafeArrayAccessData.OLEAUT32(00000000,6E946C3C), ref: 6E946C87
                                                        • _memmove.LIBCMT ref: 6E946C9A
                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E946CA3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$AccessCreateUnaccessVector_memmove
                                                        • String ID:
                                                        • API String ID: 3147195435-0
                                                        • Opcode ID: 81ab86f990a43691d386447a6ccaeb438dc7304f227e4619f8c2b27202aebc36
                                                        • Instruction ID: abd61ccab8515ea4380dc65cd25b5cdc4366d34e036a7929919978ad80a7cbbf
                                                        • Opcode Fuzzy Hash: 81ab86f990a43691d386447a6ccaeb438dc7304f227e4619f8c2b27202aebc36
                                                        • Instruction Fuzzy Hash: 97F0FE75614218BBEB105F91DC89F9B7BACEF96765F008115FA188E241E670D500DFB1
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E962206
                                                        • __CxxThrowException@8.LIBCMT ref: 6E962221
                                                          • Part of subcall function 6E966480: __CxxThrowException@8.LIBCMT ref: 6E966518
                                                          • Part of subcall function 6E966480: __CxxThrowException@8.LIBCMT ref: 6E966558
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$_mallocstd::exception::exception
                                                        • String ID: ILProtector
                                                        • API String ID: 84431791-1153028812
                                                        • Opcode ID: 293ca2dcc8ac5ac2f2997c1543ef9410bd5873714ecb424de83e324c5fd96d0e
                                                        • Instruction ID: 61753311d87c46f991563f81aa4828d7f7a96b52979155cdf754c18d9016469f
                                                        • Opcode Fuzzy Hash: 293ca2dcc8ac5ac2f2997c1543ef9410bd5873714ecb424de83e324c5fd96d0e
                                                        • Instruction Fuzzy Hash: F5713971908659DFDB14CFA8C844BDEBBB8FF99300F1085AAE419A7340DB30AA44CF91
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6E94913B
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 6E94915C
                                                        • EnterCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 6E949170
                                                        • LeaveCriticalSection.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 6E949191
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 89e39edbf7ff0d6d0a1991f204da2da4a11b0471f2200b9245a7bdbb3f31e20f
                                                        • Instruction ID: 4b18cc2b3433da6370b507684e7a558c637e94525bc4f0622b02225761687c98
                                                        • Opcode Fuzzy Hash: 89e39edbf7ff0d6d0a1991f204da2da4a11b0471f2200b9245a7bdbb3f31e20f
                                                        • Instruction Fuzzy Hash: E94134B590020ADFCB44DF95D5848EEBBB8FF89210B50455ED915AB740D730EA05CFD1
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32 ref: 6E948E89
                                                        • LeaveCriticalSection.KERNEL32(?,00000000), ref: 6E948EAD
                                                        • _memset.LIBCMT ref: 6E948ED2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave_memset
                                                        • String ID:
                                                        • API String ID: 3751686142-0
                                                        • Opcode ID: da7b549808fb5f03300217771eb5d456edc410047e1fc05b51aa3a795005f43e
                                                        • Instruction ID: 55495fa40d44cd47f7a26b1f1290f7b5811cfcb0fe9d1f1beb52c48d5ae02d46
                                                        • Opcode Fuzzy Hash: da7b549808fb5f03300217771eb5d456edc410047e1fc05b51aa3a795005f43e
                                                        • Instruction Fuzzy Hash: ED516DB5A00206EFCB58CF98C490E9AB7B6FF89304F108599E91A9B781D731E955CFD0
                                                        APIs
                                                        • SafeArrayCreateVector.OLEAUT32(0000000D,00000000,00000002), ref: 6E94D949
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 6E94D96C
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E94D9CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$CreateDestroyElementVector
                                                        • String ID:
                                                        • API String ID: 3149346722-0
                                                        • Opcode ID: 20e83d91cbea1d905c60d506ba87bd6ff8fcb0277a86fd131659b01b2cf2336f
                                                        • Instruction ID: e7b8861347fb4d65f8107913eb6c5d8c3e5a90ec6c6a2b2984b68e5ff6e032d5
                                                        • Opcode Fuzzy Hash: 20e83d91cbea1d905c60d506ba87bd6ff8fcb0277a86fd131659b01b2cf2336f
                                                        • Instruction Fuzzy Hash: 13219D39601619EFEB11CF98C894FAB77A8EF8A740F104098E944DB344E771D901CFA1
                                                        APIs
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95DB2D
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E95DB45
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E95DBA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$CreateDestroyElementVector
                                                        • String ID:
                                                        • API String ID: 3149346722-0
                                                        • Opcode ID: 078cab14904a5d6e21ecb953d62a9acf97df6edaa16c8b8b36da493aeb577838
                                                        • Instruction ID: 5e2a9f6318bc9d0454f4618c537fa4e78507f5ce0900242d4f64e34dae2d9e06
                                                        • Opcode Fuzzy Hash: 078cab14904a5d6e21ecb953d62a9acf97df6edaa16c8b8b36da493aeb577838
                                                        • Instruction Fuzzy Hash: 9F115B75645205AFD700DFA9C888FABBBA8BF5A310F048199E9089B341D730E911CFA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hq$$q$$q
                                                        • API String ID: 0-405414136
                                                        • Opcode ID: c1649339eb7ad711813459010ba131ecde0e28f0a0f2c2ddf5f56aa454e3aacd
                                                        • Instruction ID: 4557542e85d90d689ce2838d7dcb176e152d8b4084ae9a88412109cd0ab87aca
                                                        • Opcode Fuzzy Hash: c1649339eb7ad711813459010ba131ecde0e28f0a0f2c2ddf5f56aa454e3aacd
                                                        • Instruction Fuzzy Hash: AEF18F30B042098FDB55DF78D8546AEBBB6EF89341F144469E902EB3A4DB71DD02CBA1
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E964042
                                                          • Part of subcall function 6E999533: std::exception::_Copy_str.LIBCMT ref: 6E99954E
                                                        • __CxxThrowException@8.LIBCMT ref: 6E964059
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8Throw$Copy_strExceptionRaise_mallocstd::exception::_
                                                        • String ID:
                                                        • API String ID: 2813683038-0
                                                        • Opcode ID: 9c81680314b486385e74d749a64630c561db2e3a05ddd740cdba96201d62a4fa
                                                        • Instruction ID: fc881b8311c402bf3c1c31c3524e48651d1b49ebed1ebb60bdf4006df70a8024
                                                        • Opcode Fuzzy Hash: 9c81680314b486385e74d749a64630c561db2e3a05ddd740cdba96201d62a4fa
                                                        • Instruction Fuzzy Hash: 1991ABF18043049FE700DFE9C841B9AFBF8EF95740F15896AE5199B290E7B1D9448F92
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E94BE2D
                                                        • IsBadReadPtr.KERNEL32(00000000,00000008,?,?,?), ref: 6E94BE6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroyReadSafe
                                                        • String ID:
                                                        • API String ID: 616443815-0
                                                        • Opcode ID: 7f74ff2b3beeb28a8134cc2bcec8c6a0f271b3df7c68e2628a6c816c7645a224
                                                        • Instruction ID: 7abb1a69dd3881b5ead198c7211a9a01bb6ff1fed042030e213138b58e4b026f
                                                        • Opcode Fuzzy Hash: 7f74ff2b3beeb28a8134cc2bcec8c6a0f271b3df7c68e2628a6c816c7645a224
                                                        • Instruction Fuzzy Hash: DD713671D04656DEDB51CFB4885065EFBB9AF86220F088798DAE9972CDE331D482CF90
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E946466
                                                          • Part of subcall function 6E999533: std::exception::_Copy_str.LIBCMT ref: 6E99954E
                                                        • __CxxThrowException@8.LIBCMT ref: 6E94647D
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Copy_strExceptionException@8RaiseThrow_mallocstd::exception::_std::exception::exception
                                                        • String ID:
                                                        • API String ID: 2299493649-0
                                                        • Opcode ID: 50afb4c95c15e68c888f69abc5ea6d906960dcf3e352938a73aa211fd00bf257
                                                        • Instruction ID: 05d493e6fe24185c2d47f5674588ead3324871102aa3088255c15fdfabdfee7a
                                                        • Opcode Fuzzy Hash: 50afb4c95c15e68c888f69abc5ea6d906960dcf3e352938a73aa211fd00bf257
                                                        • Instruction Fuzzy Hash: 095146F2918340DFD704CF99C881A8ABBE8BF95740F44496EE9998B291E371D944CF93
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E95D3E8
                                                        • __CxxThrowException@8.LIBCMT ref: 6E95D3FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw_mallocstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 4063778783-0
                                                        • Opcode ID: 81bc13d25d38082df6f89a00b7a491881860094c74dfdcd540fcd52ca8db5aed
                                                        • Instruction ID: 1772bc08061e092ec07210b6146509ad506d6cf856673cf00f4ee0ea0493ef61
                                                        • Opcode Fuzzy Hash: 81bc13d25d38082df6f89a00b7a491881860094c74dfdcd540fcd52ca8db5aed
                                                        • Instruction Fuzzy Hash: E93137715087059FC704DF69C48099ABBF8EF99618F548A2EF8558B350E731EA06CF92
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E9627FA
                                                        • __CxxThrowException@8.LIBCMT ref: 6E96280F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw_mallocstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 4063778783-0
                                                        • Opcode ID: 6257fbe1c6ca1ad73b456dc0c30bd889a4ccc6c85ef3aeab68943e78f6a99b2a
                                                        • Instruction ID: 80e7ff15ba28557b18c4c355452ee59d84be089bfdba75ea8a9b957cff944a9a
                                                        • Opcode Fuzzy Hash: 6257fbe1c6ca1ad73b456dc0c30bd889a4ccc6c85ef3aeab68943e78f6a99b2a
                                                        • Instruction Fuzzy Hash: 04018174900205DFC708CF98D9508AAB7F9FF98300B18C5ADC81A4B751EB31EA01DF96
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hq$d8q
                                                        • API String ID: 0-4243181230
                                                        • Opcode ID: 057a9cb0b20f06454e13a93cbaebdcfe4a996a30079b1a956d547c206e892d61
                                                        • Instruction ID: 1cc5b8464c4880d61887dd3e411a9597b3478eeba3894ce79ea5e11bc0e3ea56
                                                        • Opcode Fuzzy Hash: 057a9cb0b20f06454e13a93cbaebdcfe4a996a30079b1a956d547c206e892d61
                                                        • Instruction Fuzzy Hash: F9124D34700304CFE716AB78F458B1A7B72EBA9361F504179E906473A5CBB9BD82DB21
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,?,00000000,6E948C13,?,6E948CD3,?,6E948C13,00000000,?,?,6E948C13,?,?), ref: 6E948D73
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,6E948CD3,?,6E948C13,00000000,?,?,6E948C13,?,?), ref: 6E948D8C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: 2d5531765834676d8b1df1225e3934df6149b7b6ab19f80163266e169588b98a
                                                        • Instruction ID: 5216d258b8a0266a50857b302e46f536c6a477881ec6a9c47ced2723f394033f
                                                        • Opcode Fuzzy Hash: 2d5531765834676d8b1df1225e3934df6149b7b6ab19f80163266e169588b98a
                                                        • Instruction Fuzzy Hash: 8F21F87520450AEF8B18DF89D890DABB3BAFFC9310B108549F90687354D731EE16DBA1
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,?,?,?,?,6E946890,?), ref: 6E948BDD
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 6E948C23
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: f06c59e4433c363fe4fd9828f56d6fcbbe26c72f9f0cab8e220d548d863dde49
                                                        • Instruction ID: b70d44f7047c8dc455417b17166b115945a256ba13e87d086fc28a17e368a789
                                                        • Opcode Fuzzy Hash: f06c59e4433c363fe4fd9828f56d6fcbbe26c72f9f0cab8e220d548d863dde49
                                                        • Instruction Fuzzy Hash: 260196B2708104AFCB54DFA8C88099BF3A8FF982007004669E909C7300EB32EE61CBD0
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 03299E37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 87b0b6bef5dbaa2b1267da73901ec5573d0b6179307a68829382480373f3a07a
                                                        • Instruction ID: ce0e5f6f79c11c7a23ca0ba68db8aeba9edd259fbfe03cafd66ba905eacf2579
                                                        • Opcode Fuzzy Hash: 87b0b6bef5dbaa2b1267da73901ec5573d0b6179307a68829382480373f3a07a
                                                        • Instruction Fuzzy Hash: A6B11271D102598FEF20DFA8C881BEDBBF2BB09314F14956AE858A7280D77489C5CF95
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 03299E37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 0212813e36328f29e633f2a2b8de827cfcc90735a45e5d756aa29ea8caf3794c
                                                        • Instruction ID: fc0db793274c7087c886c962b122e7f84a9cfae7f1c7517ad5155fe20ab1a4cc
                                                        • Opcode Fuzzy Hash: 0212813e36328f29e633f2a2b8de827cfcc90735a45e5d756aa29ea8caf3794c
                                                        • Instruction Fuzzy Hash: 0FB10271D102598FEF20DFA8C885BEDBBF2BB09314F14916AE858A7280D77489C5CF95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _malloc
                                                        • String ID:
                                                        • API String ID: 1579825452-0
                                                        • Opcode ID: 8afa3f7b8c20ab44072fc7f99218c56176b298db629d9aeb6f0f67d0d2408161
                                                        • Instruction ID: b3d233061c139b67ec261bfa22a6733a5ddc6a2dab8babd932925b021e4be639
                                                        • Opcode Fuzzy Hash: 8afa3f7b8c20ab44072fc7f99218c56176b298db629d9aeb6f0f67d0d2408161
                                                        • Instruction Fuzzy Hash: 2B8149F19083418FEB20DFE5889175ABBE8AF91304F184D6ED6598B390D776C8548F53
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0329A435
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: f187cceea2acae625eb1fe69b910e3fafae9de3a7d1396ed4aac2940cdf79c41
                                                        • Instruction ID: 96066f2e23734816d512603e1c8e2e0841ce3fc45b5ccf6f317c81c77a57ee06
                                                        • Opcode Fuzzy Hash: f187cceea2acae625eb1fe69b910e3fafae9de3a7d1396ed4aac2940cdf79c41
                                                        • Instruction Fuzzy Hash: C54178B4D103989FDF10CFA9D984A9EFBF1BB09314F24902AE818B7250D375A945CF54
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0329A435
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 8597298319c060e34c46140f6dab6ecb2b5d080af7f9443529bc5a5541f6f748
                                                        • Instruction ID: e1b2a7c60f0a4838ef17a7d5f263d934c5ac199b26bcb241f7c0473f1d5f9864
                                                        • Opcode Fuzzy Hash: 8597298319c060e34c46140f6dab6ecb2b5d080af7f9443529bc5a5541f6f748
                                                        • Instruction Fuzzy Hash: 6C4166B5D102589FDF10CFA9D984A9EFBF1BB49310F24902AE818B7250D375A985CF64
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0329A214
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 99af3d55ed1a3ba1ead69ba2f6113095949176febcbfbbce07a0ea6648605ce9
                                                        • Instruction ID: bf668901d4bd2f92b163fb553b9d75a90444e04bd3a033cd08e6ce010c06d0fe
                                                        • Opcode Fuzzy Hash: 99af3d55ed1a3ba1ead69ba2f6113095949176febcbfbbce07a0ea6648605ce9
                                                        • Instruction Fuzzy Hash: 953157B9D012589FDF10CFA9D984A9EFBB5BB49310F14902AE818BB310D775A941CF64
                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0329A214
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: b20ec3a83eb88239b5ee0a2dc87ac51e06af2c2475844d59df2ffc6f223a3382
                                                        • Instruction ID: 22b949a9344621fbe39d8ebfa26b41a29eb5edd517034ed8809559c2ed9cb893
                                                        • Opcode Fuzzy Hash: b20ec3a83eb88239b5ee0a2dc87ac51e06af2c2475844d59df2ffc6f223a3382
                                                        • Instruction Fuzzy Hash: 244177B8D002589FDF10CFA9D984A9EFBF1BB09310F24902AE814BB350D335A942CF54
                                                        APIs
                                                          • Part of subcall function 6E962820: _malloc.LIBCMT ref: 6E962871
                                                        • std::tr1::_Xweak.LIBCPMT ref: 6E9471D2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xweak_mallocstd::tr1::_
                                                        • String ID:
                                                        • API String ID: 4085767713-0
                                                        • Opcode ID: 87db31155337a1bde5d73c80321be79be0e2788061dbe5bb829cddf301cc48df
                                                        • Instruction ID: 6e4e8689182a17dd72f71e12494e33d5f109260cc2f0d60d8e9e49ed3912f93d
                                                        • Opcode Fuzzy Hash: 87db31155337a1bde5d73c80321be79be0e2788061dbe5bb829cddf301cc48df
                                                        • Instruction Fuzzy Hash: 5F317CB4A0474ADFCB50CFA9C990AABB7B9FF89204B108A5DE81597781D331E905CF90
                                                        APIs
                                                        • LoadLibraryW.KERNELBASE(?), ref: 03290292
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 89b78d3188933e3f944754c05f578be1e3712753651a6b3783dbe20ac81145dd
                                                        • Instruction ID: e725c6878fd08e777940b81695d796ccc71591609606c92e1f184ec816594dd9
                                                        • Opcode Fuzzy Hash: 89b78d3188933e3f944754c05f578be1e3712753651a6b3783dbe20ac81145dd
                                                        • Instruction Fuzzy Hash: A631B8B4D102199FDB14CFA9D584ADEFBF1AF48310F14902AE818B7360D734A941CF64
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,?), ref: 0329A0F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: c609d6499363b46731667ced6d0cb07c88a092824c9205c0233ea54945985cf8
                                                        • Instruction ID: 2951a1c0e8499df0f8def96f6098ce4d603fa081f28ebf653b3f23cf0a5fb63b
                                                        • Opcode Fuzzy Hash: c609d6499363b46731667ced6d0cb07c88a092824c9205c0233ea54945985cf8
                                                        • Instruction Fuzzy Hash: 8F31CAB8D012599FDF10CFA9E584AEEFBF0AB09310F24942AE814B7350C739A945CF64
                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,?), ref: 0329A0F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: daae34d1b46657b474a4cc887205802ade4899080812927d0bc37f1f07a0c2f7
                                                        • Instruction ID: f1b1cd25d41ec77cf9d7490bffb855881444942b6bc4c20b931d30e6d1607674
                                                        • Opcode Fuzzy Hash: daae34d1b46657b474a4cc887205802ade4899080812927d0bc37f1f07a0c2f7
                                                        • Instruction Fuzzy Hash: 7331AAB4D112589FDF10CFA9E584ADEFBF4AB09310F24902AE818B7350D775A945CF64
                                                        APIs
                                                        • LoadLibraryW.KERNELBASE(?), ref: 03290292
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: dbe1250a60a2233bc665978019954008bd0a549610b2b8f8e645d436f334f331
                                                        • Instruction ID: 162b5fe96f74374febc6a1bd827157893ff1bdc58e57a9a6a0f723a0e3c55958
                                                        • Opcode Fuzzy Hash: dbe1250a60a2233bc665978019954008bd0a549610b2b8f8e645d436f334f331
                                                        • Instruction Fuzzy Hash: 4031A6B4D002599FDB24CFAAD984A9EFBF5AB48310F14902AE818B7360D734A941CF64
                                                        APIs
                                                        • ResumeThread.KERNELBASE(?), ref: 0329A535
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 758a6507c29dae6f6519d8747768ff5cf01c0c51d3b24dc690f9954503a3c6b2
                                                        • Instruction ID: c69da134b164b274d6fbbb48e6b8fb9e4ad5178a4099cb215eb692cfa48134ec
                                                        • Opcode Fuzzy Hash: 758a6507c29dae6f6519d8747768ff5cf01c0c51d3b24dc690f9954503a3c6b2
                                                        • Instruction Fuzzy Hash: D73198B4E112599FDF20CFA9E984A9EFBF0AB49310F14902AE818B7310D735A941CF64
                                                        APIs
                                                        • ResumeThread.KERNELBASE(?), ref: 0329A535
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: a92c9ab614d286d96b6b6da503aa0218a46018e1bd41a3133e59a8361832fd3c
                                                        • Instruction ID: 3265bbd2d09f67e688328ace4bf756cc16cb516581c2f77848060cc5c3c9cdcc
                                                        • Opcode Fuzzy Hash: a92c9ab614d286d96b6b6da503aa0218a46018e1bd41a3133e59a8361832fd3c
                                                        • Instruction Fuzzy Hash: 113187B8D112589FDF20CFA9E984A9EFBF4AB49310F14902AE818B7310D775A941CF64
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • SysAllocString.OLEAUT32 ref: 6E95EA8D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: AllocString_malloc
                                                        • String ID:
                                                        • API String ID: 959018026-0
                                                        • Opcode ID: 9ac2a61b36c531f87ec8319c8e163ae019c9ba4c85e10e664d86e1fe3039a17d
                                                        • Instruction ID: a93974fe2bce6426e22676e151c3bf7f193b956006ba76774333503e3ab97d0b
                                                        • Opcode Fuzzy Hash: 9ac2a61b36c531f87ec8319c8e163ae019c9ba4c85e10e664d86e1fe3039a17d
                                                        • Instruction Fuzzy Hash: B0018072904A55EBD311CFA8C900B9AB7ACEF05B24F10475AEC15AB380D7B5D9008FD0
                                                        APIs
                                                        • __EH_prolog3_catch.LIBCMT ref: 6E99E8DC
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3_catch_malloc
                                                        • String ID:
                                                        • API String ID: 529455676-0
                                                        • Opcode ID: 321e4b7550d3078b61ee907a8e06be25432ca9692dacda0b65e1461a2c75b066
                                                        • Instruction ID: d6cd2b61c3f9bd8a230a86d31e8404e24ec1b5aba19fee3705e90376b5269232
                                                        • Opcode Fuzzy Hash: 321e4b7550d3078b61ee907a8e06be25432ca9692dacda0b65e1461a2c75b066
                                                        • Instruction Fuzzy Hash: D6D05E319142089BCB41ABD9C805BAD7BE8AF81329F680865E0087A280DB75CA00AF56
                                                        APIs
                                                        • ___security_init_cookie.LIBCMT ref: 6E99A510
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ___security_init_cookie
                                                        • String ID:
                                                        • API String ID: 3657697845-0
                                                        • Opcode ID: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                                        • Instruction ID: a27cea336ee132625dca13bb742108410aa517f35dbfcc3de2e4f13858f34f4b
                                                        • Opcode Fuzzy Hash: 27b748a9c275510458f0068f842967d98f7d0f67ac18c1338cd75791cb2cbf1f
                                                        • Instruction Fuzzy Hash: F1C09B351043089F8B05CF90F440CEE7719EFE4228724D515FC18067509B31D561FD54
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 8q
                                                        • API String ID: 0-4083045702
                                                        • Opcode ID: 16e7b44fc2bb6d3b088cdaab2df5eb0ff94c91357d2be5d4c6770a69222290af
                                                        • Instruction ID: cd9e33352a0a8848c50101774b812cc12889e44a89b36b6d0e82697aab34087c
                                                        • Opcode Fuzzy Hash: 16e7b44fc2bb6d3b088cdaab2df5eb0ff94c91357d2be5d4c6770a69222290af
                                                        • Instruction Fuzzy Hash: 83413574E0A208CFDB80CFA9D4846EDFBB6FF8A300F5480AAD909A3262D7745945CF50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Hq
                                                        • API String ID: 0-1594803414
                                                        • Opcode ID: e6040dce10eeb8df9ac8301ef5b41f632413110edb2cb3d841654e682ae13a4e
                                                        • Instruction ID: 0cab4c366194655c0fae67905c774c1cc472cd9e6dd7fcaaea7fcae324220808
                                                        • Opcode Fuzzy Hash: e6040dce10eeb8df9ac8301ef5b41f632413110edb2cb3d841654e682ae13a4e
                                                        • Instruction Fuzzy Hash: 2F317830A08200FFEB569F748C017AE7F76FF86304F14C49AD605DB2A1DA709D0587A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0u
                                                        • API String ID: 0-3203441087
                                                        • Opcode ID: b42e41c6bef67c68dd080f497d85e82b4c8c012f13466808d089c56a4b7c07a4
                                                        • Instruction ID: dd4b7efe93fb6fd818231d41dae9b154baa5d669c724270218d10450512f7f90
                                                        • Opcode Fuzzy Hash: b42e41c6bef67c68dd080f497d85e82b4c8c012f13466808d089c56a4b7c07a4
                                                        • Instruction Fuzzy Hash: 2C215574D04209CFDB44CFA5D4446EEFBB5FB89300F54916AE809B3254E7B55A44CBA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0u
                                                        • API String ID: 0-3203441087
                                                        • Opcode ID: d99f17da89f089aee64c3c4aa23912c7dd56a4d6a5cac7c1e5471b4669f5ad44
                                                        • Instruction ID: ec0518288129671b0ca48beb5de8a83983e461fc721703510b654824b61d8963
                                                        • Opcode Fuzzy Hash: d99f17da89f089aee64c3c4aa23912c7dd56a4d6a5cac7c1e5471b4669f5ad44
                                                        • Instruction Fuzzy Hash: 07212074D04209DFDB44CFA5D8446EEFBB9FB89300F509569E80AB3254EBB55A44CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1e2938f33ff9b14fdc4daa34ebd2dd61a53aff7c67360553a3851d814f8fcadf
                                                        • Instruction ID: 01e3e6215146027893faa3efde35a713bef003fe22111254df46f8a1ac5d46d5
                                                        • Opcode Fuzzy Hash: 1e2938f33ff9b14fdc4daa34ebd2dd61a53aff7c67360553a3851d814f8fcadf
                                                        • Instruction Fuzzy Hash: 9441F774E01219DFDB44DFA8D884AAEFBB6FF89300F148169E805A7364DB75AD02CB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f0db4ae5c66448b443f046693fddd2bf81703e7e2d797fa3aca57726e7ff5136
                                                        • Instruction ID: 0224939316fae5022b97974f460c65c92332761e2dc17e89fb18171434d6500e
                                                        • Opcode Fuzzy Hash: f0db4ae5c66448b443f046693fddd2bf81703e7e2d797fa3aca57726e7ff5136
                                                        • Instruction Fuzzy Hash: 3B31AE70E05248CFCB51DFA8E85469CBBB5FF8A311F5080AAE809E7352D7B05C42DB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fca2ea468eb2e3f2e3ecdce7432ac9f53c9267cc2bdd3ed3d6ab7f7237e7cadc
                                                        • Instruction ID: 6cf2d2756e68f54542abf32ee257101f85349d33a9a95b1932ffd9c0f363fa87
                                                        • Opcode Fuzzy Hash: fca2ea468eb2e3f2e3ecdce7432ac9f53c9267cc2bdd3ed3d6ab7f7237e7cadc
                                                        • Instruction Fuzzy Hash: 8E215974E09209CFDB85CFA9C8846EEFBF5AF89201F54846AC805A7391D7705946CB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265598450.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_14ad000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aaeb1d9d026322ae1583d71da52e7731c1721d95d39fd50a324bebfe5ebeae42
                                                        • Instruction ID: b59dc69473b4479dd6063dc839a8dd037de1d2e47807569f091aa056569bf0a2
                                                        • Opcode Fuzzy Hash: aaeb1d9d026322ae1583d71da52e7731c1721d95d39fd50a324bebfe5ebeae42
                                                        • Instruction Fuzzy Hash: EF212575904240DFDB15DF54E9C0B26BB66FB98314F64816AE8090B766C336D807CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265598450.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_14ad000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 179ff7a5325b6f4b6e2791ee889bbd0efa1b31a128c6c06a90a1c57db852a5ad
                                                        • Instruction ID: a6385657789c5953cabccbe63432942ab525fb7c5c44842df73d9fe05309ef27
                                                        • Opcode Fuzzy Hash: 179ff7a5325b6f4b6e2791ee889bbd0efa1b31a128c6c06a90a1c57db852a5ad
                                                        • Instruction Fuzzy Hash: 092137B1A08340DFDB15DF54D9C0B26BB65FB94324F64C56AE8090B766C336D406C761
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265598450.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_14ad000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f7bd456691e35eb644b150718dbddc2d34a0861dd01695e322c94b631086baa7
                                                        • Instruction ID: 5e71208d9afe94b2f9cfdbe7483708770120612c33eb6eca365f08412b3cd501
                                                        • Opcode Fuzzy Hash: f7bd456691e35eb644b150718dbddc2d34a0861dd01695e322c94b631086baa7
                                                        • Instruction Fuzzy Hash: A4213471A04300EFD710DF54D9C4B56BB65EB94224F60C27ED8490BB66C335E447CA62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dde33500f8658e7163d89c15337e7b851ead350e717e594b336d062ed826f3dc
                                                        • Instruction ID: c5abdefadd634dbb460fd4f8884d0508c7eef62a623fef2a9972ab48abd44308
                                                        • Opcode Fuzzy Hash: dde33500f8658e7163d89c15337e7b851ead350e717e594b336d062ed826f3dc
                                                        • Instruction Fuzzy Hash: D321FF74E00209DFCB45CFA9C840AEEBBB1FB49304F00806AEA25AB350D7759958CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 87118c653f409668c3646405ed808b9ba03bc9bcba75d13b2604020cd2576974
                                                        • Instruction ID: f53ec095d9aa9494c7fbbc4e963e2b023754678dc89a8a2d954c9987b0336cb9
                                                        • Opcode Fuzzy Hash: 87118c653f409668c3646405ed808b9ba03bc9bcba75d13b2604020cd2576974
                                                        • Instruction Fuzzy Hash: 7B2114B4E0020ADFDB44DFA9D0446AEFBF1FB48310F6481A9D815A7256D7749982CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c1472c0689898ebea02d891cfa39fcab8621506576b6c88d041797f95d21b399
                                                        • Instruction ID: 78570c01f78720bd719c5447aedf8c6785fa54ec3959a4b68a097887d11379c6
                                                        • Opcode Fuzzy Hash: c1472c0689898ebea02d891cfa39fcab8621506576b6c88d041797f95d21b399
                                                        • Instruction Fuzzy Hash: 812137B4E05209CFDB84CFA9C4846EEFBF5BF89301F548469D905A7350D7705A41CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5c80669267037607ad8c46b4479df1b4e9110572e48b5ff1218423cdc94f0b33
                                                        • Instruction ID: c0861556a241c5eef325a848cb1d2380d3e636e81d1535c22e7f0714f1be680f
                                                        • Opcode Fuzzy Hash: 5c80669267037607ad8c46b4479df1b4e9110572e48b5ff1218423cdc94f0b33
                                                        • Instruction Fuzzy Hash: 6421A47490522CCFDBA8CF29C8457E9BBB1FB59301F1084DAD90AA2254E7B44AD0CF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265598450.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_14ad000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fa649175a6a07c1293a0646eeb1dae1d7184f3825364c931512ed0431d75e21e
                                                        • Instruction ID: 62027182544f3661bc531b178f47b516cc4393ee8421fab081b809171853d3ad
                                                        • Opcode Fuzzy Hash: fa649175a6a07c1293a0646eeb1dae1d7184f3825364c931512ed0431d75e21e
                                                        • Instruction Fuzzy Hash: 9511B176504280CFDB16CF54D5C0B16BF72FB84314F2481AAD8090B656C33AD41ACBA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265598450.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_14ad000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 45ccc22ca586cb30894c3454275cb8d7f6963b827b46ca0b3fb863fd11c94238
                                                        • Instruction ID: db6eaea89279802b0b6a0e6d3f3c10471d3eca8753e80104aa47ed7d50e55dc2
                                                        • Opcode Fuzzy Hash: 45ccc22ca586cb30894c3454275cb8d7f6963b827b46ca0b3fb863fd11c94238
                                                        • Instruction Fuzzy Hash: EA110476904280CFDB16CF54D5C0B16BF71FB84324F24C6AAD8090BB66C33AD41ACBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d44f42a05c17eaa38788d76803d2f7284a425827867b93b50afb606702989700
                                                        • Instruction ID: 91fc81bfacd517302b4d250ff9100024faa6852e3d1457be5290a42246ab9a90
                                                        • Opcode Fuzzy Hash: d44f42a05c17eaa38788d76803d2f7284a425827867b93b50afb606702989700
                                                        • Instruction Fuzzy Hash: F4110270D00308DFDB64DFA9D454AEEFBB5AF4A300F10842AC415BB294EBB59942CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265598450.00000000014AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014AD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_14ad000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c95414d4725d7fd5483965d0f24f32316cc368c67e293f58d38c0de91b7fe89c
                                                        • Instruction ID: 8bf9afc9eef1973e77debf88a38b040e110a820fcc1e2ef68323f07e47053057
                                                        • Opcode Fuzzy Hash: c95414d4725d7fd5483965d0f24f32316cc368c67e293f58d38c0de91b7fe89c
                                                        • Instruction Fuzzy Hash: 19110175904280DFDB12CF14D5C4B5ABF61FB84324F24C2AAD8490BB66C33AE44ACB92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a9f98a7eb5c77f62c0de0a0a26abfa717c11998562a342d68280083aaba2e0d2
                                                        • Instruction ID: a75d93e76dd701f5e638fdc594b7ad6fd3569d95d78a1747f04076821cb11fe3
                                                        • Opcode Fuzzy Hash: a9f98a7eb5c77f62c0de0a0a26abfa717c11998562a342d68280083aaba2e0d2
                                                        • Instruction Fuzzy Hash: F21148B0D09349DFCB86CFB998042AEBFF1AF4A310F5581AAD804E3257D3B40940CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265533817.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_149d000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 88979ca9f0512367c856d29000bd86f7c0b80995e07e7b2eaa82502a3052858f
                                                        • Instruction ID: 75e1d5045435a7797ae333b428142e4099c892fbd3f646fe742b52a882f1f519
                                                        • Opcode Fuzzy Hash: 88979ca9f0512367c856d29000bd86f7c0b80995e07e7b2eaa82502a3052858f
                                                        • Instruction Fuzzy Hash: 48012BB29043049FFB209E95CC85767FF9CDF41221F08C52BED080B396C2389845CAB2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b81971c803ffb9dad2660e0d3c1aed0041b2cf20c207d39ee28dc23cbe054539
                                                        • Instruction ID: a1e3ae90e7a44e58552c1b55399d695e8ca08ace7659b3e78037bf0703594871
                                                        • Opcode Fuzzy Hash: b81971c803ffb9dad2660e0d3c1aed0041b2cf20c207d39ee28dc23cbe054539
                                                        • Instruction Fuzzy Hash: FCF0FC62C0E3C08FD7528B7898112E8FFB4AF67300B4801DBD845DB2A3E2755905D711
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1265533817.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_149d000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e29994554cfe873675b75aa39b9fb2fd56486bd4baa7db42fc7a44466b8a7c58
                                                        • Instruction ID: b4dce7611c9c30ff9d09e55cdbdac10b2b906fa016f60bd589e38a7555d13d19
                                                        • Opcode Fuzzy Hash: e29994554cfe873675b75aa39b9fb2fd56486bd4baa7db42fc7a44466b8a7c58
                                                        • Instruction Fuzzy Hash: FDF0C2724043449EEB208E0ACC84B63FFA8EF80234F18C15AED080A297C2799844CAB1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8adabeaf3fb54da164bdc43e3e68bedef86df97f12687a1a30844550d1206e57
                                                        • Instruction ID: 3c7b230b092c9c766bd0e958064a48637e775a67390e1cf19ca150d1629fccd9
                                                        • Opcode Fuzzy Hash: 8adabeaf3fb54da164bdc43e3e68bedef86df97f12687a1a30844550d1206e57
                                                        • Instruction Fuzzy Hash: 9F019374804228CFDBA4CF68D8857D9BBB0FB09311F9084E5DA0EA2252D7B04ED5CF64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c03ac74245de275737f818d26e244ce6d01dc918ef9c32dae99931edca82e564
                                                        • Instruction ID: 0c59dd000f5507970e54fcbff0b1630c746fe23fcc65b34f7c8e52add6b3c10f
                                                        • Opcode Fuzzy Hash: c03ac74245de275737f818d26e244ce6d01dc918ef9c32dae99931edca82e564
                                                        • Instruction Fuzzy Hash: 8BF02B3090D3854FC7D39BA89414269BFB46B2A301F8A019BC408C72F7D7B01801DB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2e2eed7cc859a5292a50b91c9d55263a6ee03c01230de0abce53289d7b3f9989
                                                        • Instruction ID: 8b4d3230022d4054a4c262d674058e909d513972e367846d8d08ada86b825698
                                                        • Opcode Fuzzy Hash: 2e2eed7cc859a5292a50b91c9d55263a6ee03c01230de0abce53289d7b3f9989
                                                        • Instruction Fuzzy Hash: F4F08C708093C8AFE762DB7894143ADBFB4EB53300F8A41AAC844DB2ABD7B50D45C715
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 444f2896148d6ca395eacdd8c79dcd9338fd02ee881564ea383fd61ae38d0cf8
                                                        • Instruction ID: 105a6b43997103447c17ce41be462a8a6fcc1eacedc480e027612191c50138c8
                                                        • Opcode Fuzzy Hash: 444f2896148d6ca395eacdd8c79dcd9338fd02ee881564ea383fd61ae38d0cf8
                                                        • Instruction Fuzzy Hash: 4AE09B35304259BB9F161F559814CBE7F7AEFC83617058019FD69C2214CF71CA2197B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8cb4daaf792faf4188d823acf3605e2f693ed49dadcaa8cd6487a86cb7f1b0f7
                                                        • Instruction ID: c16d06445c527734c7132da0c021d4752f455fb5eeb05683ad628e769f359c9f
                                                        • Opcode Fuzzy Hash: 8cb4daaf792faf4188d823acf3605e2f693ed49dadcaa8cd6487a86cb7f1b0f7
                                                        • Instruction Fuzzy Hash: BFE0393185E3849FC7859B68E4106E8BFB5AB4B304F1852DAD819A7263D27249068B55
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8e367fa66bb5502294fed8f87bf531ef073be49bed31b779de83676824ffa6a6
                                                        • Instruction ID: be098c3cc6c3a9e173ba0810223b1b7574fe94f647acfd05398ce306ae34f770
                                                        • Opcode Fuzzy Hash: 8e367fa66bb5502294fed8f87bf531ef073be49bed31b779de83676824ffa6a6
                                                        • Instruction Fuzzy Hash: 11F09874D04209EFDB44EFE8D5446AEBBF5BF48300F2081AAD805A3354DB705A40DBA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 370ada3aaee2ebda6cf560799183f56ce187986ea23523bcd369f809f72a207c
                                                        • Instruction ID: a9697bec26862a66c9654e835702b3a3d94b37926957ac8bc3fea0f94e942eec
                                                        • Opcode Fuzzy Hash: 370ada3aaee2ebda6cf560799183f56ce187986ea23523bcd369f809f72a207c
                                                        • Instruction Fuzzy Hash: 57E0263444C3C55FC3621B7454283AE7F749B63222F8B059B8809C71E383780C04C766
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ea295d827383dd1fa6fa58d83151ef0c2213853d6606c81d1b5ee4586907d119
                                                        • Instruction ID: 6e25145b433952156f77ac0c3263e7f429ea9072de70c77062a84b1966e9b6a7
                                                        • Opcode Fuzzy Hash: ea295d827383dd1fa6fa58d83151ef0c2213853d6606c81d1b5ee4586907d119
                                                        • Instruction Fuzzy Hash: E9E0DF70804348BFE720DB78A004399BEB8EB02300FC600ADC808932A9D7B10D40C315
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a759a1be4fd395fb93176913c95eea7928560370ac7f535fb5bcbd791f8a41d0
                                                        • Instruction ID: 35cde4332a0ec4bd5a3361ad3c2d729e731adb7922149a2fdaeb8eca5456c896
                                                        • Opcode Fuzzy Hash: a759a1be4fd395fb93176913c95eea7928560370ac7f535fb5bcbd791f8a41d0
                                                        • Instruction Fuzzy Hash: 81E012B0D00308EFCB54DFA9D404A9DBFB5FB48300FA081AAD814A3340E7759A90DF85
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 58769440bea70e893154e9ebd5d33274750710e0b81235ff8dd90973cd199c50
                                                        • Instruction ID: b343a0d7766d681f2b423dd8b227888e3ab2dfdb0fea41a92acd51616a7c99e7
                                                        • Opcode Fuzzy Hash: 58769440bea70e893154e9ebd5d33274750710e0b81235ff8dd90973cd199c50
                                                        • Instruction Fuzzy Hash: 18E01774D05208EFCB90EFB8E84969CBFF8AB05201F9041AADD08A3390E7705E50DB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9e2bbb22e9ddb392629cdb55c15c9fdfc73d101553f258a1d37dba94f07e73f5
                                                        • Instruction ID: 72db327e7e4fb96d7380057d78499888bad552d40c60deb61a5cb5bc93990401
                                                        • Opcode Fuzzy Hash: 9e2bbb22e9ddb392629cdb55c15c9fdfc73d101553f258a1d37dba94f07e73f5
                                                        • Instruction Fuzzy Hash: 41D05E30901308EBC714EFA8E40469DBB74AB41305F9042ECC90423394C7B15E50DB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e007ef56bc6807d7f798eb96484be8aa1cb04e9e39679adf4e74023656010c9d
                                                        • Instruction ID: a47491d6de86f6b1289beeaade8a44b76795c0def51c2978cb0c228f639eb666
                                                        • Opcode Fuzzy Hash: e007ef56bc6807d7f798eb96484be8aa1cb04e9e39679adf4e74023656010c9d
                                                        • Instruction Fuzzy Hash: 00D02232498304EFF7245368A8183AC7FB0EB03310F8E022A8D49424F283B91C40CBA6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 03fa858ba6005e7bd7a24d21b555bbbf56c8943e01fb7286e49c2520a7deac78
                                                        • Instruction ID: 0f00fb43fce579be803cc076c86e1695545cb3bac4ca1cfda625aa1c10a47252
                                                        • Opcode Fuzzy Hash: 03fa858ba6005e7bd7a24d21b555bbbf56c8943e01fb7286e49c2520a7deac78
                                                        • Instruction Fuzzy Hash: 58E092B8E04248CFCB40CFE8E9984ACFFB1FB4D310B50406AE806AA328D7751889CF10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 131626f022c0c9c9b169a7e79ea8c56d353ff6ce8fe0093b63f342c432837921
                                                        • Instruction ID: 959e74fdd9efe8091dd32ccc639fdaf4327adeb4f70136ec3ce7c9262bcd35a7
                                                        • Opcode Fuzzy Hash: 131626f022c0c9c9b169a7e79ea8c56d353ff6ce8fe0093b63f342c432837921
                                                        • Instruction Fuzzy Hash: 99D05E30804208EFC750DFA8E44469CBFB4EB01301F4401A9D80463390D7B01E54CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 590c5c9664bd9cb9492a89e13accf104da9e669efd8b3b345b763989f520e12b
                                                        • Instruction ID: 3432f516918c522111d95f1384937c219b9001085476ef3cdf553546f235f3ef
                                                        • Opcode Fuzzy Hash: 590c5c9664bd9cb9492a89e13accf104da9e669efd8b3b345b763989f520e12b
                                                        • Instruction Fuzzy Hash: 04D012306143089FDF605F75E90CB27BFE8AF04251F048135E90AC3161EF72C850DA50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d160fdf08ccdc7232aa79c904b766ff81e72e62f94190aeb8ca3787403258348
                                                        • Instruction ID: f6d963d7fb377d50d472f738d17624ef94c8a5c51c81ee7107bd8b6b03fb32c7
                                                        • Opcode Fuzzy Hash: d160fdf08ccdc7232aa79c904b766ff81e72e62f94190aeb8ca3787403258348
                                                        • Instruction Fuzzy Hash: 0BE04C74D00628CFCBA4DF14DD94B99BBB1EB45306F4101D5A50EA2265DA741EC5CF40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fb6b1a464c18f22ff081bad541bc7c8c23348b059451f72cbe3dae5743e3c21a
                                                        • Instruction ID: f47b8b8a9c4bfa6883717c6339509eabc511e8dfb6160af591b1f13c8340137b
                                                        • Opcode Fuzzy Hash: fb6b1a464c18f22ff081bad541bc7c8c23348b059451f72cbe3dae5743e3c21a
                                                        • Instruction Fuzzy Hash: 31B09B7204070497E6245799740C7687E5C9701315FCD01159A5D014B487F05490D7A9
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E952DFF
                                                        • VariantInit.OLEAUT32(?), ref: 6E952E08
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E952E7E
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E952EB5
                                                        • VariantClear.OLEAUT32(?), ref: 6E952EC1
                                                          • Part of subcall function 6E95C850: VariantInit.OLEAUT32(?), ref: 6E95C88F
                                                          • Part of subcall function 6E95C850: VariantInit.OLEAUT32(?), ref: 6E95C895
                                                          • Part of subcall function 6E95C850: SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95C8A0
                                                          • Part of subcall function 6E95C850: SafeArrayPutElement.OLEAUT32(00000000,00000000,?), ref: 6E95C8D5
                                                          • Part of subcall function 6E95C850: VariantClear.OLEAUT32(?), ref: 6E95C8E1
                                                        • VariantClear.OLEAUT32(?), ref: 6E9530D5
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E953550
                                                        • VariantClear.OLEAUT32(?), ref: 6E953563
                                                        • VariantClear.OLEAUT32(?), ref: 6E953569
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArrayClearSafe$Init$CreateElementVector$Destroy
                                                        • String ID:
                                                        • API String ID: 2012514194-0
                                                        • Opcode ID: f6e33b83b44d62e95330146d7ab2cd8c11fc376e805addc93dfc1adfd42fbcf6
                                                        • Instruction ID: 73fee3fe8a1f7817e07f17045ce183777d43a88e27c30f78fba20944eb005aa1
                                                        • Opcode Fuzzy Hash: f6e33b83b44d62e95330146d7ab2cd8c11fc376e805addc93dfc1adfd42fbcf6
                                                        • Instruction Fuzzy Hash: D3526A71900218DFDB44DFA8C884BEEBBB9BF99300F148599E909AB345D770E946CF90
                                                        APIs
                                                        • CorBindToRuntimeEx.MSCOREE(v2.0.50727,wks,00000000,6E9C0634,6E9C0738,?), ref: 6E94A119
                                                        • GetModuleHandleW.KERNEL32(mscorwks), ref: 6E94A145
                                                        • __cftoe.LIBCMT ref: 6E94A1FB
                                                        • GetModuleHandleW.KERNEL32(?), ref: 6E94A215
                                                        • GetProcAddress.KERNEL32(00000000,00000018), ref: 6E94A265
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: HandleModule$AddressBindProcRuntime__cftoe
                                                        • String ID: mscorwks$v2.0.50727$wks
                                                        • API String ID: 1312202379-2066655427
                                                        • Opcode ID: 00893cd221ac9c9bc5517942e67bce18f3630c15c731a31b1e0ebac045d55a96
                                                        • Instruction ID: 3c0106fe8ac219da049678c3fa8266326560b37736ea1d2cb65ec896216d3429
                                                        • Opcode Fuzzy Hash: 00893cd221ac9c9bc5517942e67bce18f3630c15c731a31b1e0ebac045d55a96
                                                        • Instruction Fuzzy Hash: 499147B0904249DFDB04DFE8C88099EBBB9BF89300F20866DE519EB244E774E945CF95
                                                        APIs
                                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,64F62E83,6E9B8180,00000000,?), ref: 6E98DBFB
                                                        • GetLastError.KERNEL32 ref: 6E98DC01
                                                        • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000008), ref: 6E98DC15
                                                        • CryptAcquireContextA.ADVAPI32(?,Crypto++ RNG,00000000,00000001,00000028), ref: 6E98DC26
                                                        • SetLastError.KERNEL32(00000000), ref: 6E98DC2D
                                                          • Part of subcall function 6E98D9D0: GetLastError.KERNEL32(00000010,64F62E83,7686FC30,?,00000000), ref: 6E98DA1A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E98DC78
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: AcquireContextCryptErrorLast$ExceptionException@8RaiseThrow
                                                        • String ID: CryptAcquireContext$Crypto++ RNG
                                                        • API String ID: 3279666080-1159690233
                                                        • Opcode ID: 0febe6c285e7869f30ed91a30120b67f8afae5389cf9c11cbbbea5c2ad4500c2
                                                        • Instruction ID: 3d2ae0b790aa95296cbe65582f54804f58403658d108ee969f0725df31c82c15
                                                        • Opcode Fuzzy Hash: 0febe6c285e7869f30ed91a30120b67f8afae5389cf9c11cbbbea5c2ad4500c2
                                                        • Instruction Fuzzy Hash: 0D2180B1258751ABE3109BA8CC45F9BBBECAF99B44F00091EF541962C0EBB5E4048F52
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 4'q$4'q$4'q$4|q$4|q$$q
                                                        • API String ID: 0-3102600102
                                                        • Opcode ID: a190034b4ad16a5c6bad9e102f0a7bf01fabdd4c2745741128b8c5bdaf4072a6
                                                        • Instruction ID: 3efcc21dd964de47eb27ca006b696e8bb0abbe0cd149ffe4565eff11738edc97
                                                        • Opcode Fuzzy Hash: a190034b4ad16a5c6bad9e102f0a7bf01fabdd4c2745741128b8c5bdaf4072a6
                                                        • Instruction Fuzzy Hash: BA02F531B042118FEB69DB79C85462DFBA2BF8520072944ADDD06CB3A6DFB1DE42C791
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 6E99CE6C
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6E99CE81
                                                        • UnhandledExceptionFilter.KERNEL32(6E9B9428), ref: 6E99CE8C
                                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 6E99CEA8
                                                        • TerminateProcess.KERNEL32(00000000), ref: 6E99CEAF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                        • String ID:
                                                        • API String ID: 2579439406-0
                                                        • Opcode ID: a95e3643ef44d0b37b36564acfb98d17b64132132c74dc46f7d9dcab6086d595
                                                        • Instruction ID: 597f380029d64b883b569412081c643285f9070e7b70215dd3f535a5f5fab798
                                                        • Opcode Fuzzy Hash: a95e3643ef44d0b37b36564acfb98d17b64132132c74dc46f7d9dcab6086d595
                                                        • Instruction Fuzzy Hash: DA21BEB5809E24AFCB50CF99D5886857BF4FF4A304F10401AE9099BB48FBB099C1CF19
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E9924A1
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • std::exception::exception.LIBCMT ref: 6E99248C
                                                          • Part of subcall function 6E999533: std::exception::_Copy_str.LIBCMT ref: 6E99954E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                                        • String ID:
                                                        • API String ID: 757275642-0
                                                        • Opcode ID: 8153fd50a247ce22bfb0cd39d08d75e51df56413a75c42ff061ffa8c393ef338
                                                        • Instruction ID: d02b3f01de6102355493e92d53930ba17184495fde9508b0da359f040d0f57a9
                                                        • Opcode Fuzzy Hash: 8153fd50a247ce22bfb0cd39d08d75e51df56413a75c42ff061ffa8c393ef338
                                                        • Instruction Fuzzy Hash: 21329071A016068FDB44CFE9D490AAEB7B9FF99704B18452CE8069B354EB30ED05DFA1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: faa55d51597e2f5759ede6410a83fd02763d7c7b85fb03f964f9f4d85edd5856
                                                        • Instruction ID: cbfa5a434fbe4ef42bb5bba1d9ef10bb85be4d011fee0c4bd4360aa5cd06ce47
                                                        • Opcode Fuzzy Hash: faa55d51597e2f5759ede6410a83fd02763d7c7b85fb03f964f9f4d85edd5856
                                                        • Instruction Fuzzy Hash: B7029FB041CB688FC764CF69C4A053EBBF1EFDA211F41090EE5F657269E234A598CB61
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: bb6d9701454231976b4d208943d44cd68a135a8c04800967e4df893cc45bcbb8
                                                        • Instruction ID: ce9666e898fb2e89dfcf8cc81eb5a92f22b7076084a3a2df402226aa564e26dd
                                                        • Opcode Fuzzy Hash: bb6d9701454231976b4d208943d44cd68a135a8c04800967e4df893cc45bcbb8
                                                        • Instruction Fuzzy Hash: 5CE191B042CB698FC764CB69C8A053E7BF1EFD7211F41050EE5F5572A9E234A1A9CB21
                                                        APIs
                                                        • CryptGenRandom.ADVAPI32(?,?,?,64F62E83,00000000), ref: 6E98DE6F
                                                        • __CxxThrowException@8.LIBCMT ref: 6E98DEB9
                                                          • Part of subcall function 6E98DD20: CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,6E9AF0E6,000000FF,6E98DF67,00000000,?), ref: 6E98DDB4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Crypt$ContextException@8RandomReleaseThrow
                                                        • String ID: CryptGenRandom
                                                        • API String ID: 1047471967-3616286655
                                                        • Opcode ID: 2328f9287d0e1796d052660ebef0ee946bf906cf3b4ed7d9793b3a1d39e15341
                                                        • Instruction ID: 50f60f831e5b98e53c7a77fea3c4c6fb31098f69b94be43c17b1ceaee1d6b334
                                                        • Opcode Fuzzy Hash: 2328f9287d0e1796d052660ebef0ee946bf906cf3b4ed7d9793b3a1d39e15341
                                                        • Instruction Fuzzy Hash: 62212371418B809FD704DFA4C444B9ABBF8AF99718F004A0EE85587384EB74E548CF92
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: 9da8888e02ac697131423c4c0eb27ec44e9760c07a33f8de3d0011babceee962
                                                        • Instruction ID: 868c6ccfbbbb6dd9778b2802d42175a90d34d62d6169addeaa375f7437f8acd2
                                                        • Opcode Fuzzy Hash: 9da8888e02ac697131423c4c0eb27ec44e9760c07a33f8de3d0011babceee962
                                                        • Instruction Fuzzy Hash: 60523570114A668FC358CF29C0E056BBBE2EFCE315758898DD4D68B396D234F5A1CBA0
                                                        APIs
                                                        • GetLastError.KERNEL32(00000010,64F62E83,7686FC30,?,00000000), ref: 6E98DA1A
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastXinvalid_argumentstd::_
                                                        • String ID: operation failed with error $OS_Rng:
                                                        • API String ID: 406877150-700108173
                                                        • Opcode ID: 4a600a812d1a7535762210602e03f34c80d48e38adcc7353d04d8c305efd3b8a
                                                        • Instruction ID: a3ca761eb5cb2c45c157ed13f3085ed290f3ce8d9897893b257bd66612921f41
                                                        • Opcode Fuzzy Hash: 4a600a812d1a7535762210602e03f34c80d48e38adcc7353d04d8c305efd3b8a
                                                        • Instruction Fuzzy Hash: D94127B1508380AFD321CFA9C841B9BBBE8AFD9644F144D2EE18987251EB75D444CF63
                                                        APIs
                                                        • std::exception::exception.LIBCMT ref: 6E991E1D
                                                          • Part of subcall function 6E999533: std::exception::_Copy_str.LIBCMT ref: 6E99954E
                                                        • __CxxThrowException@8.LIBCMT ref: 6E991E32
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Copy_strExceptionException@8RaiseThrowstd::exception::_std::exception::exception
                                                        • String ID:
                                                        • API String ID: 757275642-0
                                                        • Opcode ID: 0a09eb64536dbf0da56630087d1c994a5e4bdfb0866406f248fbdd95554c0d27
                                                        • Instruction ID: c96e841d7703bbff5eed56061e862e93282539730ca0f69243583842691c3cfa
                                                        • Opcode Fuzzy Hash: 0a09eb64536dbf0da56630087d1c994a5e4bdfb0866406f248fbdd95554c0d27
                                                        • Instruction Fuzzy Hash: E4329071A006069FDB48CFD9D8909AEB3BEFF8A740B19452DE5169B354EB30E904DF90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0e3e8b3825e4d4069971ee7ef4f675d26c03b02e25217e9e64496db02114037e
                                                        • Instruction ID: fa72af2eb4b5656e60139128db3585c4c5f5dfea99dc9d7479cc6390898083ff
                                                        • Opcode Fuzzy Hash: 0e3e8b3825e4d4069971ee7ef4f675d26c03b02e25217e9e64496db02114037e
                                                        • Instruction Fuzzy Hash: BA320161D29F414DDB639939C832336729DAFA73C4F11D737E829B5A9AEF29C4834500
                                                        APIs
                                                          • Part of subcall function 6E934760: __CxxThrowException@8.LIBCMT ref: 6E9347F9
                                                        • CryptReleaseContext.ADVAPI32(?,00000000,00000000,?), ref: 6E98DF7B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ContextCryptException@8ReleaseThrow
                                                        • String ID:
                                                        • API String ID: 3140249258-0
                                                        • Opcode ID: f167dfc6a43ddc5cf520e49c39381da664e7ab37553070fadb11f3903c1c06fc
                                                        • Instruction ID: f06f14ecd59424b03bcaad44ac56cb529252162dca009bdf19e8b668ce3253c0
                                                        • Opcode Fuzzy Hash: f167dfc6a43ddc5cf520e49c39381da664e7ab37553070fadb11f3903c1c06fc
                                                        • Instruction Fuzzy Hash: A521AFB5508344ABC240DF55C940B4BBBECEFEA668F000A2EF84583391D771E908CFA2
                                                        APIs
                                                        • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000000,6E9AF0E6,000000FF,6E98DF67,00000000,?), ref: 6E98DDB4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ContextCryptRelease
                                                        • String ID:
                                                        • API String ID: 829835001-0
                                                        • Opcode ID: 5470b48ee255deaa0277c170c9a26743e44f4a11589338b36cd23ddd9ed80287
                                                        • Instruction ID: 880ac9302ca545d78d1f9206eb97563588105af9921e1fa1431111f1303e6306
                                                        • Opcode Fuzzy Hash: 5470b48ee255deaa0277c170c9a26743e44f4a11589338b36cd23ddd9ed80287
                                                        • Instruction Fuzzy Hash: 7411A2B1608B615FE710CF98C89179773ECEF45A10F080D2AE915C7780EB79D4048F91
                                                        APIs
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6E98D803
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ContextCryptRelease
                                                        • String ID:
                                                        • API String ID: 829835001-0
                                                        • Opcode ID: bda0048bd52aca266d85e830790c48ee8e5f0ca8d9867cebb2bbbaf425597a00
                                                        • Instruction ID: c09f55f0feeb1e5b8540674773b9f9583d5807043faa7ce098434a66e5ba0975
                                                        • Opcode Fuzzy Hash: bda0048bd52aca266d85e830790c48ee8e5f0ca8d9867cebb2bbbaf425597a00
                                                        • Instruction Fuzzy Hash: 12D05EB1B0536216D6209A949C05B8776CC4F51A44F19482AF559D2390D6B4D8418EE5
                                                        APIs
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6E9B35F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ContextCryptRelease
                                                        • String ID:
                                                        • API String ID: 829835001-0
                                                        • Opcode ID: 9d331ead13966a9778a91e5f9c77409a784d470a7c652d4646615e781db4f79f
                                                        • Instruction ID: 0d38a8195a6538363787dd876d7ff0cfae8222cada23322eb36c8e0cce363894
                                                        • Opcode Fuzzy Hash: 9d331ead13966a9778a91e5f9c77409a784d470a7c652d4646615e781db4f79f
                                                        • Instruction Fuzzy Hash: 51D05EB1505A229BEF50CAA4981AB8733EC5F12A40F080010E504C7284EFB4D8408F64
                                                        APIs
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6E98D7E0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ContextCryptRelease
                                                        • String ID:
                                                        • API String ID: 829835001-0
                                                        • Opcode ID: 172fc3a902fdcccf9ae4691d593a7013857e20ebbf9c3c78da4260503a4e5360
                                                        • Instruction ID: 6304e7afdb30b2de0d28c658bf87f0e8dc45a543fef630dcd7ec48ef4ada38bf
                                                        • Opcode Fuzzy Hash: 172fc3a902fdcccf9ae4691d593a7013857e20ebbf9c3c78da4260503a4e5360
                                                        • Instruction Fuzzy Hash: 31B012F0B0520167EF3C8F118B68B2B3A1D6F41F46F10484C660A553908A63E402CD04
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: 87301c1e1620c97d990bc2f692860f4cb7b400d4596613ba8475f39e5d7b100b
                                                        • Instruction ID: 8c5d483c9c0b01485e4b4edb872a6d10cd8eaddc2db00b8777421db31e940f80
                                                        • Opcode Fuzzy Hash: 87301c1e1620c97d990bc2f692860f4cb7b400d4596613ba8475f39e5d7b100b
                                                        • Instruction Fuzzy Hash: 37916C71818B868BE701CF6CC8829AAB7A0FFD9354F149B1DFDD562210EB35D548CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: N@
                                                        • API String ID: 0-1509896676
                                                        • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                        • Instruction ID: f743e58687c36d3f23855f093b5d43751b6759406f7d0d0b8242fcdc488856ac
                                                        • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                                        • Instruction Fuzzy Hash: 986139B1A007168FDB18CF88C4946AABBF2BF84314F1AC5AED9195F365C7B1D954CB80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: e46e8281a9deb3a52b8c2ef0ee3fb48392f647ce4e45e089888081192aa57ad8
                                                        • Instruction ID: 1aba8a9d73820a39c1cfe7caf5c7a456cbb6429f4926256dd5bbe5feea161c1c
                                                        • Opcode Fuzzy Hash: e46e8281a9deb3a52b8c2ef0ee3fb48392f647ce4e45e089888081192aa57ad8
                                                        • Instruction Fuzzy Hash: DC519F72818B829BE311CF6DC8829ABF7A0BFD9244F209B1DFDD562611EB75C544CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @
                                                        • API String ID: 0-2766056989
                                                        • Opcode ID: 3de0045e5c6d1a8ec8c6755177c3c4be8090bd8d618057417eb006cb60e37b2d
                                                        • Instruction ID: f176670fb2c2266c64601c44a34b49bae64168605e8eb9e62ae130e4128c6008
                                                        • Opcode Fuzzy Hash: 3de0045e5c6d1a8ec8c6755177c3c4be8090bd8d618057417eb006cb60e37b2d
                                                        • Instruction Fuzzy Hash: 83516F71818B869BE301CF6DC8819ABF7A0BFD9244F209B1DFDD562611EB75C544CB81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: :
                                                        • API String ID: 0-336475711
                                                        • Opcode ID: 0c401dd303462324f3f60539a9adbdcfd1dcc71732445747d965312d8321cbe7
                                                        • Instruction ID: d27e22e46423437bdb6dd3946505767aef8636e5c6e33da8e22de6e94bf9487a
                                                        • Opcode Fuzzy Hash: 0c401dd303462324f3f60539a9adbdcfd1dcc71732445747d965312d8321cbe7
                                                        • Instruction Fuzzy Hash: 69616E74E016298FDB64CB68CD80B9DBBF1FF89300F5482E9D558EB245D7709A858F11
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: lq
                                                        • API String ID: 0-573745274
                                                        • Opcode ID: 83241b55b781feae77ebd13794c3a3376749c0632065555f3871f60546a3a336
                                                        • Instruction ID: b24568f485a1dcd779667390d8f9a796589ea28ddc582c812518fc3aafbf0861
                                                        • Opcode Fuzzy Hash: 83241b55b781feae77ebd13794c3a3376749c0632065555f3871f60546a3a336
                                                        • Instruction Fuzzy Hash: C331D275E01208AFDB04CFA5D484AEEFBF5FF49310F10906AE915B7260DB709A04CBA9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: lq
                                                        • API String ID: 0-573745274
                                                        • Opcode ID: 7a0e06e6e7981aac9a9c8e81f53e9b30b6326aae48448aa6fa4ba2905c339587
                                                        • Instruction ID: caf186d1381d39519f120b01737c5601f19c90cac76deaf68853c2cf837f25d7
                                                        • Opcode Fuzzy Hash: 7a0e06e6e7981aac9a9c8e81f53e9b30b6326aae48448aa6fa4ba2905c339587
                                                        • Instruction Fuzzy Hash: 6E31B275E01208AFDB04CFA5D484AEEFBF5EF49310F10906AE915B7260DB709A048B99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e57defef04cdd397cd2c8daee722437a19485c34a4febab60d24264a227c0bb9
                                                        • Instruction ID: aa74d366f6ce4f68929a12cab1b95c4886cb057314d35bff452369b36ed46ff4
                                                        • Opcode Fuzzy Hash: e57defef04cdd397cd2c8daee722437a19485c34a4febab60d24264a227c0bb9
                                                        • Instruction Fuzzy Hash: 755299716483058FC758CF5EC98054AF7F2BBC8718F18CA7DA599C6B21E374E9468B82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 79c477024e71e463717b892515b73390a80f0de7856b5551fe47b4012150965c
                                                        • Instruction ID: f58f59fd753db1d5a06673b96f9205d3f47784dbc8776f863be213912ecc1d89
                                                        • Opcode Fuzzy Hash: 79c477024e71e463717b892515b73390a80f0de7856b5551fe47b4012150965c
                                                        • Instruction Fuzzy Hash: AA223E71A083058FC344CF69C88064AF7E2FFC8318F59892DE598D7715E775EA4A8B92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c32662eef60f0c471b7fdac11190f1f5451b2dd2c365e0225398f315df61cf83
                                                        • Instruction ID: 9ded071ad59cd704732e825f270e8da77efaef640fe718d0d309e11cafb84771
                                                        • Opcode Fuzzy Hash: c32662eef60f0c471b7fdac11190f1f5451b2dd2c365e0225398f315df61cf83
                                                        • Instruction Fuzzy Hash: A80296717443018FC758CF6ECC8154AB7E2ABC8314F19CA7DA499C7B21E778E94A8B52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e485bdb1e59d7b42e29f3a8aa3fe403936397c163f8a5a3f88d2470699029853
                                                        • Instruction ID: 34543e006108cd0440bf8b9ecf966d207909658ea972eab33a099acbe9918cdf
                                                        • Opcode Fuzzy Hash: e485bdb1e59d7b42e29f3a8aa3fe403936397c163f8a5a3f88d2470699029853
                                                        • Instruction Fuzzy Hash: D502903280A2B49FDB92EF5ED8405AB73F5FF90355F43892ADC8163241D335EA099B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9ed4dd07c22fc926db6187162ceb4f6c9de92f9471c57bfdad431e9e1507ebf3
                                                        • Instruction ID: 5f0367c05d9e803403292a80ae2ee566663ed1d763c363ca41ed2b3cb0e999bd
                                                        • Opcode Fuzzy Hash: 9ed4dd07c22fc926db6187162ceb4f6c9de92f9471c57bfdad431e9e1507ebf3
                                                        • Instruction Fuzzy Hash: 2ED1A4716443018FC348CF1EC98164AF7E2BFD8718F19CA6DA599C7B21D379E9468B42
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 35bd22f95dab943cb3221f365cd1ea733415a38271d1e5144e58f245e77465ab
                                                        • Instruction ID: c90962f4f351e742a589fa77946b7e0647bca30d4e324d4321a4cdcf81c33502
                                                        • Opcode Fuzzy Hash: 35bd22f95dab943cb3221f365cd1ea733415a38271d1e5144e58f245e77465ab
                                                        • Instruction Fuzzy Hash: F0A1423241A2B49FDB92EF6ED8400AB73E5EF94355F43892FDCC167281C235EA089795
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 326bc5982354ac438e1a9f739f44fe0e5fdd5d63dcd15d05e6311c1e57b5f58c
                                                        • Instruction ID: 77c67e4e61c8f026e6fc0232a3d214a61c66183bd9c4334c8bf01a2cff0a98da
                                                        • Opcode Fuzzy Hash: 326bc5982354ac438e1a9f739f44fe0e5fdd5d63dcd15d05e6311c1e57b5f58c
                                                        • Instruction Fuzzy Hash: 8171A371A083058FC344CF1AC94164AF7E2FFC8718F19C96DA898C7B21E775E9468B82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7cdc20a2fddfc9a188b602cbb1ee077ba7ac09752fea693f80eeb2021d0fc81c
                                                        • Instruction ID: c816e45da3559c3907b7fb3d5880d540d82664f1bd06f7db55950fe47940c881
                                                        • Opcode Fuzzy Hash: 7cdc20a2fddfc9a188b602cbb1ee077ba7ac09752fea693f80eeb2021d0fc81c
                                                        • Instruction Fuzzy Hash: 1F51F776A083058FC344CF69C88064AF7E2FBC8318F59C93DE999C7715E675E94A8B81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6ba715fd754b714e9d068fda8deb8e9fc5fdebe33215753f3ecb5741719fa00b
                                                        • Instruction ID: 69990af1b33206951b8dcabbca6b0527f4b1e7b774d6cca876f21f347aff3c55
                                                        • Opcode Fuzzy Hash: 6ba715fd754b714e9d068fda8deb8e9fc5fdebe33215753f3ecb5741719fa00b
                                                        • Instruction Fuzzy Hash: 9441D972B042168FCB48CE2ECC4165AF7E6FBC8210B4DC639A859C7B15E734E9498B91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 17f47d64676ac6721b02c7348975aecd388139d1b8c739d3e0bee53eb8f2c30e
                                                        • Instruction ID: b2e0c60058fd452a682adc1aac13eefbec3f2dd1ec32349a2b7afd1333fafcc0
                                                        • Opcode Fuzzy Hash: 17f47d64676ac6721b02c7348975aecd388139d1b8c739d3e0bee53eb8f2c30e
                                                        • Instruction Fuzzy Hash: 9A51DDB4D1034D9FEF24CFA9D884BAEBBF1BB49304F24912AE414AB290D7749885CF44
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 378e4feadde3055ad8c89781cf2bc0e494515d34795228e40aa9cae23669a8d2
                                                        • Instruction ID: cd0288c9f7a3b6c76b2294e90f721cd5e399e80ce8fd082cc0adb24d3eb74d59
                                                        • Opcode Fuzzy Hash: 378e4feadde3055ad8c89781cf2bc0e494515d34795228e40aa9cae23669a8d2
                                                        • Instruction Fuzzy Hash: 3841DCB4D1034D9FEF24CFA9D985B9DFBF5AB49304F24902AE818AB290D7749885CF44
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f8bf5a89ffef69f344e6e8193914170c14a28b6c4aea654e567071568625f4c
                                                        • Instruction ID: 54e266ca1b948d18c4b7d45ce2eb3f73dda5b1e77e0546b370a1b9394bb978cb
                                                        • Opcode Fuzzy Hash: 1f8bf5a89ffef69f344e6e8193914170c14a28b6c4aea654e567071568625f4c
                                                        • Instruction Fuzzy Hash: D6419E7120C30D0ED35CFEE496DB397B6D4E789280F41543F9A018A1A2FEA0955996D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266019168.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_1750000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 41d02797deb3a67f8730633d47249deab97e9a80fdd50306ed50b6e95c4e9e6c
                                                        • Instruction ID: 8a15d4f261e8bbe0960d34bce8d7c18c9389ea6b398f0b6d793059a716b66853
                                                        • Opcode Fuzzy Hash: 41d02797deb3a67f8730633d47249deab97e9a80fdd50306ed50b6e95c4e9e6c
                                                        • Instruction Fuzzy Hash: FA412EB1E05A188BEB58CF6BCD4479AFAF3AFC9301F54C1B9C44CA6255DB7009458F11
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 56ac40019b237c7bcca0805688784f2455af0e1ed9b6b9d9c3244007eb6d31eb
                                                        • Instruction ID: 78e1166fca24fa085e8f3fbaeec9068b04521cfa80a79eca552f9df9281ab9ad
                                                        • Opcode Fuzzy Hash: 56ac40019b237c7bcca0805688784f2455af0e1ed9b6b9d9c3244007eb6d31eb
                                                        • Instruction Fuzzy Hash: 1931DDB8D14258CFDB10CFA9D484AEEFBF0AB09310F14902AE814B7240C739A985CF64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 00322d60ddf866d3fe41eca1789de41659fa4673a63bd1ba346475ccd9a1cb7c
                                                        • Instruction ID: c2f7557a8be925393f24ce476caea59864abd3ef7a80db1f947c5150e7c4f163
                                                        • Opcode Fuzzy Hash: 00322d60ddf866d3fe41eca1789de41659fa4673a63bd1ba346475ccd9a1cb7c
                                                        • Instruction Fuzzy Hash: 9131BBB4D15258DFDB10CFA9D484AEEFBF4AB49310F14902AE818B7250D738A985CF64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5705ad9ae9bde45bddd647ac77531d5ce011eb5b190f50097b46c871cb523246
                                                        • Instruction ID: 29f0515d9c48190200aa905a93bb275314b75fd1cf26ab0677fd46da1b7e22bc
                                                        • Opcode Fuzzy Hash: 5705ad9ae9bde45bddd647ac77531d5ce011eb5b190f50097b46c871cb523246
                                                        • Instruction Fuzzy Hash: 3B31D375E01209AFDB04CFA5D484AEEFBF1FF49300F10906AE915BB260DB709A05CB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3f087ad85f38e664d12f66e2a6fbe709364fe0c0f9ce89e39985c32975190584
                                                        • Instruction ID: afdce29806d7796c89d493487b0d4e45855fe1d3741d7260fabf02ec00b3cb9d
                                                        • Opcode Fuzzy Hash: 3f087ad85f38e664d12f66e2a6fbe709364fe0c0f9ce89e39985c32975190584
                                                        • Instruction Fuzzy Hash: 8A31C175E41208AFDB04CFA5D484AEEFBF5FF49310F10906AE915BB260DB709A05CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5ec449c8514a984cea3ab29f58578ba48b425c42be31c24bccaa21645191daa7
                                                        • Instruction ID: 1bf596ce81551b2568458de23c4c50bb2677623d1c2b45db2fddb002223eda0a
                                                        • Opcode Fuzzy Hash: 5ec449c8514a984cea3ab29f58578ba48b425c42be31c24bccaa21645191daa7
                                                        • Instruction Fuzzy Hash: FC31C475E01208AFDB04CFA5D484AEEFBF5FF49310F10906AE915B7260DB70AA44CB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0896a4c5523f56fd153edf31e26bd257ba40ea3ecc77337e331537e6e7f4e64c
                                                        • Instruction ID: d818c59b7dd55b55522dfdfdeb9fa1af16d880914ddd9b81a624c0f1dfc329d0
                                                        • Opcode Fuzzy Hash: 0896a4c5523f56fd153edf31e26bd257ba40ea3ecc77337e331537e6e7f4e64c
                                                        • Instruction Fuzzy Hash: 5931C275E01208AFDB04CFA5D484AEEFBF5FF49310F10906AE915B7260DB70AA04CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6c2a4e5319b11e48729058604c95f45a5f512c01db7aed5589e00d7c185c0113
                                                        • Instruction ID: 3322faebe9e435f4bbe604b0833a1456fea73228f048d67ec45fdc8d03230cb4
                                                        • Opcode Fuzzy Hash: 6c2a4e5319b11e48729058604c95f45a5f512c01db7aed5589e00d7c185c0113
                                                        • Instruction Fuzzy Hash: 5321E7367155624BE705CE2EC8908A6B7A7FF8D31472981F9E808CB283CA70E916C7D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 519b3b72f4d0e40bab733eecf5f1683974662187ffa70974d5324fa566ddd64b
                                                        • Instruction ID: 77e744e144684fc2eb64045e7a3d23c418bffae2f5e45bfbb2be96410316c525
                                                        • Opcode Fuzzy Hash: 519b3b72f4d0e40bab733eecf5f1683974662187ffa70974d5324fa566ddd64b
                                                        • Instruction Fuzzy Hash: AD219F757046974BE719CF2EC84059BBBA7EFD9300B1980B7E858DB242C674E866CBD0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 491a25c253d72754cd753df5ea73fe4730b8206852d94c2a89a3efade510d907
                                                        • Instruction ID: 56c03b565510826836395351bbb2b44035b6968ebbd4edee8518492a9907ccd1
                                                        • Opcode Fuzzy Hash: 491a25c253d72754cd753df5ea73fe4730b8206852d94c2a89a3efade510d907
                                                        • Instruction Fuzzy Hash: EB11E63A709A530BF308CE2EE844493B797EFCD31476A85AEA858DF146C771E416CA91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ef0fe430f5274c6fa702dd06a168edf7b4634a1fa37fbabfcf4ba1ecb026e4e8
                                                        • Instruction ID: 08d643dc1901933b5d0d4e19dff38376578eef0f9d4f57754522601d65c7ad60
                                                        • Opcode Fuzzy Hash: ef0fe430f5274c6fa702dd06a168edf7b4634a1fa37fbabfcf4ba1ecb026e4e8
                                                        • Instruction Fuzzy Hash: A9110A31A156A24BD7018E2DC4406D77B6BAFCE710B1A41EAD854DF257C7B4D81BC7D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2dadbfe3adbfb0b66bf4c1413387d0617cacabd9bfb7d8947eed8b5604580509
                                                        • Instruction ID: a5a5d69b24ee234df54bbb1491b2500070334ecee308de04307913e7b9a7a94a
                                                        • Opcode Fuzzy Hash: 2dadbfe3adbfb0b66bf4c1413387d0617cacabd9bfb7d8947eed8b5604580509
                                                        • Instruction Fuzzy Hash: 7521ACB4D152088FDB20CF99D584AEEFBF1EB49320F24901AE819B7350C735A945CF64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1266702418.0000000003290000.00000040.00000800.00020000.00000000.sdmp, Offset: 03290000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_3290000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5ca1934409a3814d8eff3e17301b822fa45f0f5f149545e3588e2361b5991067
                                                        • Instruction ID: c659bcae6f95b4d47fa16d377db5adf1be171d3d0b9facc9b0d13bea37568030
                                                        • Opcode Fuzzy Hash: 5ca1934409a3814d8eff3e17301b822fa45f0f5f149545e3588e2361b5991067
                                                        • Instruction Fuzzy Hash: 10219BB5D112189FDB20CFA9D584ADEFBF4EB49320F24901AE818B3350C735A945CF65
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a2c9017b505fbbe853e81ab0812d29d446aa82f96e6eabd9ebdf9569441b6532
                                                        • Instruction ID: 59ee1506ef657013f072f4d5a5deb8decdb2c7573a4a6dc4589f233058947d4c
                                                        • Opcode Fuzzy Hash: a2c9017b505fbbe853e81ab0812d29d446aa82f96e6eabd9ebdf9569441b6532
                                                        • Instruction Fuzzy Hash: 5E115E72908609EFC714CF59D841799FBF4FB85724F10826EE81997B80E735A940CB90
                                                        APIs
                                                        • operator+.LIBCMT ref: 6E9A6FCC
                                                          • Part of subcall function 6E9A4147: DName::DName.LIBCMT ref: 6E9A415A
                                                          • Part of subcall function 6E9A4147: DName::operator+.LIBCMT ref: 6E9A4161
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: NameName::Name::operator+operator+
                                                        • String ID:
                                                        • API String ID: 2937105810-0
                                                        • Opcode ID: 640f68247fa2921d580a7bfcb08774018fe350347b7d335d35fb11e4bc19f9ef
                                                        • Instruction ID: 3be8eee1de7ca7e8f9a7cfc730981c16b536ced3e9112f4027a4c2059e675a0a
                                                        • Opcode Fuzzy Hash: 640f68247fa2921d580a7bfcb08774018fe350347b7d335d35fb11e4bc19f9ef
                                                        • Instruction Fuzzy Hash: DBD10BB1910209AFDF00DFECD895AEEBBF9AF59314F10445AEA11AB290DB34DA45CF50
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99ECA5
                                                        • __mtterm.LIBCMT ref: 6E99ECB1
                                                          • Part of subcall function 6E99E97C: DecodePointer.KERNEL32(00000012,6E99A397,6E99A37D,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99E98D
                                                          • Part of subcall function 6E99E97C: TlsFree.KERNEL32(0000000A,6E99A397,6E99A37D,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99E9A7
                                                          • Part of subcall function 6E99E97C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6E99A397,6E99A37D,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E9A2325
                                                          • Part of subcall function 6E99E97C: DeleteCriticalSection.KERNEL32(0000000A,?,?,6E99A397,6E99A37D,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E9A234F
                                                        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6E99ECC7
                                                        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6E99ECD4
                                                        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6E99ECE1
                                                        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6E99ECEE
                                                        • TlsAlloc.KERNEL32(?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99ED3E
                                                        • TlsSetValue.KERNEL32(00000000,?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99ED59
                                                        • __init_pointers.LIBCMT ref: 6E99ED63
                                                        • EncodePointer.KERNEL32(?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99ED74
                                                        • EncodePointer.KERNEL32(?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99ED81
                                                        • EncodePointer.KERNEL32(?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99ED8E
                                                        • EncodePointer.KERNEL32(?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99ED9B
                                                        • DecodePointer.KERNEL32(Function_0006EB00,?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99EDBC
                                                        • __calloc_crt.LIBCMT ref: 6E99EDD1
                                                        • DecodePointer.KERNEL32(00000000,?,?,6E99A2D4,6E9C95C0,00000008,6E99A468,?,?,?,6E9C95E0,0000000C,6E99A523,?), ref: 6E99EDEB
                                                        • GetCurrentThreadId.KERNEL32 ref: 6E99EDFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                                        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                        • API String ID: 1868149495-3819984048
                                                        • Opcode ID: 11033eb70835035e827e1f4c610143b59d2e394467de9a1740477b89f9e5ee2b
                                                        • Instruction ID: 466ebe51d7388837c44102bda963062e3e52e9747d40ab32cfe2787328d7f30d
                                                        • Opcode Fuzzy Hash: 11033eb70835035e827e1f4c610143b59d2e394467de9a1740477b89f9e5ee2b
                                                        • Instruction Fuzzy Hash: 9E315B3185CF259BDF51EFF598086167BE8FFA7660718052AE8209B290EB30D481EF90
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Xinvalid_argumentstd::_
                                                        • String ID: invalid string position$string too long
                                                        • API String ID: 1771113911-4289949731
                                                        • Opcode ID: 38c31f6a26e1f8570b94a0b6e5b59199176b5d9bdd6cbc11f32544af7e238966
                                                        • Instruction ID: 0799ba04b1b524ad0224b938a0a3e1ff886ce32a32548c9ea7e28c3d3f38fb52
                                                        • Opcode Fuzzy Hash: 38c31f6a26e1f8570b94a0b6e5b59199176b5d9bdd6cbc11f32544af7e238966
                                                        • Instruction Fuzzy Hash: 3BB16FB1710146DFEB28CF9DCC90AAF73AAEF963447144919E4528B741D730EC958FA2
                                                        APIs
                                                        • UnDecorator::getBasicDataType.LIBCMT ref: 6E9A7FFF
                                                        • DName::operator=.LIBCMT ref: 6E9A8013
                                                        • DName::operator+=.LIBCMT ref: 6E9A8021
                                                        • UnDecorator::getPtrRefType.LIBCMT ref: 6E9A804D
                                                        • UnDecorator::getDataIndirectType.LIBCMT ref: 6E9A80CA
                                                        • UnDecorator::getBasicDataType.LIBCMT ref: 6E9A80D3
                                                        • operator+.LIBCMT ref: 6E9A8166
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Decorator::getType$Data$Basic$IndirectName::operator+=Name::operator=operator+
                                                        • String ID: std::nullptr_t$volatile
                                                        • API String ID: 2203807771-3726895890
                                                        • Opcode ID: 59354072b06e06a0ff81f1cb9509a98ffa2c25610845406d86e7aff6ea2baa2e
                                                        • Instruction ID: 23b4e7f42fbec336f1a4a0772faf7b4a674bb1097b0bf0efefb0e33978c0f97d
                                                        • Opcode Fuzzy Hash: 59354072b06e06a0ff81f1cb9509a98ffa2c25610845406d86e7aff6ea2baa2e
                                                        • Instruction Fuzzy Hash: 8B41AEB240859ABFCF689FECC8989EE7B78FF42345F408465EB549A241D730D6828F50
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E94FA0F
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E94FA22
                                                        • SafeArrayGetElement.OLEAUT32 ref: 6E94FA5A
                                                          • Part of subcall function 6E953A90: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E953B71
                                                          • Part of subcall function 6E953A90: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E953B83
                                                          • Part of subcall function 6E9569C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E956A08
                                                          • Part of subcall function 6E9569C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E956A15
                                                          • Part of subcall function 6E9569C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E956A41
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                          • Part of subcall function 6E94DFB0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E94DFF6
                                                          • Part of subcall function 6E94DFB0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E94E003
                                                          • Part of subcall function 6E94DFB0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E94E02F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Bound$Destroy$Element
                                                        • String ID: RS7m$RS{m
                                                        • API String ID: 959723449-144615663
                                                        • Opcode ID: c477648a8f9492cdec8f2c61d2348547638dd73bb929dec49f49b6a6302433a5
                                                        • Instruction ID: ee45c593dfd9b4403fc4ff027dea1327b52125969aa8b4962e76e15e4e5a1c8e
                                                        • Opcode Fuzzy Hash: c477648a8f9492cdec8f2c61d2348547638dd73bb929dec49f49b6a6302433a5
                                                        • Instruction Fuzzy Hash: 65C11B70A00205EFDB54DFA8CC90FA9B7BDAF85308F244598E945AB386DB71E981CF50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Init$Clear$Copy
                                                        • String ID:
                                                        • API String ID: 3833040332-0
                                                        • Opcode ID: f6a4396177dd033ad9b9aaad638929f86bc412794f182c337fa0b16d07af47a5
                                                        • Instruction ID: 8e519ba5227653f3e7adeb14cb5e1f025f0ff2a81111b8d6deb44547b10ab893
                                                        • Opcode Fuzzy Hash: f6a4396177dd033ad9b9aaad638929f86bc412794f182c337fa0b16d07af47a5
                                                        • Instruction Fuzzy Hash: 548148B1900219AFDB04DBE8C884AEEBBB9BF89304F14455DE505AB344EB74E915CF90
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E95D8EC
                                                        • VariantInit.OLEAUT32 ref: 6E95D902
                                                        • VariantInit.OLEAUT32(?), ref: 6E95D90D
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000002), ref: 6E95D929
                                                        • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6E95D966
                                                        • VariantClear.OLEAUT32(?), ref: 6E95D973
                                                        • SafeArrayPutElement.OLEAUT32(?,?,?), ref: 6E95D9B4
                                                        • VariantClear.OLEAUT32(?), ref: 6E95D9C1
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95DA6F
                                                        • VariantClear.OLEAUT32(?), ref: 6E95DA80
                                                        • VariantClear.OLEAUT32(?), ref: 6E95DA87
                                                        • VariantClear.OLEAUT32(?), ref: 6E95DA99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArraySafe$Init$Element$CreateDestroyVector
                                                        • String ID:
                                                        • API String ID: 1625659656-0
                                                        • Opcode ID: 09a47060af2402de582cf210a90c9e286c448a9bd9459ea297d811dcd3cfd578
                                                        • Instruction ID: d5742e6d1884ac36970ceb96055f43ef8cf2cfd83ef8e6f2620b04f08cef986d
                                                        • Opcode Fuzzy Hash: 09a47060af2402de582cf210a90c9e286c448a9bd9459ea297d811dcd3cfd578
                                                        • Instruction Fuzzy Hash: D08102766087029FC700CFA8C884B5BB7E8AFD9714F048A5DE9959B350E774E906CF92
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                        • String ID: invalid string position$string too long
                                                        • API String ID: 2168136238-4289949731
                                                        • Opcode ID: efa7934fe02c2c856bc1c72aba9c049575586bed3452d70b3da743fad4afdf20
                                                        • Instruction ID: d24fbe3db4cbb7dd91c7aad086557e009bbc1db79070db18831693dc78294423
                                                        • Opcode Fuzzy Hash: efa7934fe02c2c856bc1c72aba9c049575586bed3452d70b3da743fad4afdf20
                                                        • Instruction Fuzzy Hash: 89415431300206DFE714CEDEDC90AAEB7AAEF862547240D2EE891C7B41D770D8598BA1
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E954BDC
                                                        • VariantInit.OLEAUT32(?), ref: 6E954BE5
                                                        • VariantInit.OLEAUT32(?), ref: 6E954BEB
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E954BF6
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E954C2A
                                                        • VariantClear.OLEAUT32(?), ref: 6E954C37
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E955107
                                                        • VariantClear.OLEAUT32(?), ref: 6E955117
                                                        • VariantClear.OLEAUT32(?), ref: 6E95511D
                                                        • VariantClear.OLEAUT32(?), ref: 6E955123
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                                        • String ID:
                                                        • API String ID: 2515392200-0
                                                        • Opcode ID: e6c29134334e0bb643955fab7018f54da785c49d637917adfc758c8ad1ef24f0
                                                        • Instruction ID: fc932255b450fd245f923217822f37a3289e352ff0dc1b8a1323767973370f13
                                                        • Opcode Fuzzy Hash: e6c29134334e0bb643955fab7018f54da785c49d637917adfc758c8ad1ef24f0
                                                        • Instruction Fuzzy Hash: A112E475A15705AFC758DBE8DD84DAAB3B9BF8D300F144668F50AABB91CA30F841CB50
                                                        APIs
                                                        • VariantInit.OLEAUT32(6E9B05A8), ref: 6E9549EE
                                                        • VariantInit.OLEAUT32(?), ref: 6E9549F7
                                                        • VariantInit.OLEAUT32(?), ref: 6E9549FD
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E954A08
                                                        • SafeArrayPutElement.OLEAUT32(00000000,?,?), ref: 6E954A39
                                                        • VariantClear.OLEAUT32(?), ref: 6E954A45
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E954B66
                                                        • VariantClear.OLEAUT32(?), ref: 6E954B76
                                                        • VariantClear.OLEAUT32(?), ref: 6E954B7C
                                                        • VariantClear.OLEAUT32(6E9B05A8), ref: 6E954B82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                                        • String ID:
                                                        • API String ID: 2515392200-0
                                                        • Opcode ID: 057313d3c2389577e01fc1c2c88374ddf7a2596d1b8ec2caf16a12cf0f088174
                                                        • Instruction ID: d051add1bcdeb3d5f0f3b3f351c988ac532c9fcd49b7f1aebc071e0f981c9b94
                                                        • Opcode Fuzzy Hash: 057313d3c2389577e01fc1c2c88374ddf7a2596d1b8ec2caf16a12cf0f088174
                                                        • Instruction Fuzzy Hash: 18513B72A00219AFDB44DFA4CC84EAEB7B8FF99310F044559E915AB344D735E912CFA0
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E95480C
                                                        • VariantInit.OLEAUT32(?), ref: 6E954815
                                                        • VariantInit.OLEAUT32(?), ref: 6E95481B
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E954826
                                                        • SafeArrayPutElement.OLEAUT32(00000000,000000FF,?), ref: 6E95485B
                                                        • VariantClear.OLEAUT32(?), ref: 6E954868
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E954974
                                                        • VariantClear.OLEAUT32(?), ref: 6E954984
                                                        • VariantClear.OLEAUT32(?), ref: 6E95498A
                                                        • VariantClear.OLEAUT32(?), ref: 6E954990
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArrayInitSafe$CreateDestroyElementVector
                                                        • String ID:
                                                        • API String ID: 2515392200-0
                                                        • Opcode ID: 5c2aeec3606a4b86de355bdb9117d2714a8e4957024c747b344a59e1c28de850
                                                        • Instruction ID: d542a30a14fb42f8ce9401b7edaa1c4c403659abc62df9943900d0550f7a27da
                                                        • Opcode Fuzzy Hash: 5c2aeec3606a4b86de355bdb9117d2714a8e4957024c747b344a59e1c28de850
                                                        • Instruction Fuzzy Hash: 78513872904249AFDB14DFE8C880EAEB7B9FF99310F144569E506AB644D730E906CFA0
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E94DD00
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000003), ref: 6E94DD10
                                                        • SafeArrayPutElement.OLEAUT32(00000000,6E952FFF,?), ref: 6E94DD47
                                                        • VariantClear.OLEAUT32(?), ref: 6E94DD4F
                                                        • SafeArrayPutElement.OLEAUT32(00000000,6E952FFF,?), ref: 6E94DD6D
                                                        • SafeArrayPutElement.OLEAUT32(00000000,00000002,?), ref: 6E94DDA4
                                                        • VariantClear.OLEAUT32(?), ref: 6E94DDAC
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E94DE16
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E94DE27
                                                        • VariantClear.OLEAUT32(?), ref: 6E94DE31
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Variant$ClearElement$Destroy$CreateInitVector
                                                        • String ID:
                                                        • API String ID: 3525949229-0
                                                        • Opcode ID: 8c5d5a5190946c9a84b45a9c59985238d23c68be286e3832e888d7121fa0a54e
                                                        • Instruction ID: 32c47bf1a06bb01da84281831156489c62ca60899b39a25a592a0cc2c8eeda57
                                                        • Opcode Fuzzy Hash: 8c5d5a5190946c9a84b45a9c59985238d23c68be286e3832e888d7121fa0a54e
                                                        • Instruction Fuzzy Hash: 15513D75A04609AFDB00DFA5C894EDFBBB8EF9A700F008119EA15A7350EB34D901CFA0
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E96C213
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                        • String ID: gfff$gfff$gfff$gfff$gfff$gfff$vector<T> too long
                                                        • API String ID: 1823113695-1254974138
                                                        • Opcode ID: 4bb46e7a253dbcc4ad4d769a94f70ac85eec889cdaff5c06cf512ed0a2176dfb
                                                        • Instruction ID: 36d2e00c631b9451c8f1dbdcabd70d1d8fb6d33a2437cd9df527ddebe898414a
                                                        • Opcode Fuzzy Hash: 4bb46e7a253dbcc4ad4d769a94f70ac85eec889cdaff5c06cf512ed0a2176dfb
                                                        • Instruction Fuzzy Hash: 059155B1600209AFDB18CF99D890EAAB7B9EF98314F04861DF955DB344E770B904CB91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                        • String ID: invalid string position$string too long
                                                        • API String ID: 2168136238-4289949731
                                                        • Opcode ID: d8a3788430ec1692fdb443694cabd072aa4b445b5d112655ec88236fead0482e
                                                        • Instruction ID: 42ac885f6e30b965d495b7d947362e86c59f4d4a9c522d2a4ad3e28044dfef3b
                                                        • Opcode Fuzzy Hash: d8a3788430ec1692fdb443694cabd072aa4b445b5d112655ec88236fead0482e
                                                        • Instruction Fuzzy Hash: A151B432310206DFD724DE9CD880A6FB3AAEFE5314B24491DE855C7784E770E8548F92
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 6E961C5E
                                                        • LoadLibraryW.KERNEL32(User32.dll,?,00000000,?,?,?,?,?,?,?,?), ref: 6E961C69
                                                        • GetProcAddress.KERNEL32(00000000,F1F2E532), ref: 6E961CA2
                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 6E961CC1
                                                        • LoadLibraryW.KERNEL32(kernel32.dll,?,00000000), ref: 6E961CCC
                                                        • GetProcAddress.KERNEL32(00000000,EFF3E52B), ref: 6E961D0A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleLibraryLoadModuleProc
                                                        • String ID: User32.dll$kernel32.dll
                                                        • API String ID: 310444273-1965990335
                                                        • Opcode ID: 2295308e57821e1b279a0179d4a5dd6d1e2b2a5b412577da08176fb73fc61ffb
                                                        • Instruction ID: 7b71ad59eeb92ac3e8cbede49035e858a6c9822c20f7bee3942335d2a1298160
                                                        • Opcode Fuzzy Hash: 2295308e57821e1b279a0179d4a5dd6d1e2b2a5b412577da08176fb73fc61ffb
                                                        • Instruction Fuzzy Hash: 216162B4504B108FD760CF9AC191A6BBBF2FF96700F608919D5968BB42D735E84ACF81
                                                        APIs
                                                        • UnDecorator::getArgumentList.LIBCMT ref: 6E9A442E
                                                          • Part of subcall function 6E9A3FC9: Replicator::operator[].LIBCMT ref: 6E9A404C
                                                          • Part of subcall function 6E9A3FC9: DName::operator+=.LIBCMT ref: 6E9A4054
                                                        • DName::operator+.LIBCMT ref: 6E9A4487
                                                        • DName::DName.LIBCMT ref: 6E9A44DF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArgumentDecorator::getListNameName::Name::operator+Name::operator+=Replicator::operator[]
                                                        • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                        • API String ID: 834187326-2211150622
                                                        • Opcode ID: 78cbd65bffa58a5bddb569a684793e7286cb70bc83f33612df6d212dc7c744ab
                                                        • Instruction ID: fc7813e27e42998ee08f619f01fbb8d91fcba7f811dc6f016e893243e84bee42
                                                        • Opcode Fuzzy Hash: 78cbd65bffa58a5bddb569a684793e7286cb70bc83f33612df6d212dc7c744ab
                                                        • Instruction Fuzzy Hash: FB2159B4204A0AAFCF01CB9CC894AA97BF9EF46389B508199E945CF316CB30D943CF50
                                                        APIs
                                                        • UnDecorator::UScore.LIBCMT ref: 6E9A5D40
                                                        • DName::DName.LIBCMT ref: 6E9A5D4C
                                                          • Part of subcall function 6E9A3B3B: DName::doPchar.LIBCMT ref: 6E9A3B6C
                                                        • UnDecorator::getScopedName.LIBCMT ref: 6E9A5D8B
                                                        • DName::operator+=.LIBCMT ref: 6E9A5D95
                                                        • DName::operator+=.LIBCMT ref: 6E9A5DA4
                                                        • DName::operator+=.LIBCMT ref: 6E9A5DB0
                                                        • DName::operator+=.LIBCMT ref: 6E9A5DBD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                                        • String ID: void
                                                        • API String ID: 1480779885-3531332078
                                                        • Opcode ID: af1a0ac280b1e9ce57dac687583498f5eb63187f42e28c3b7a68ce0c593e6c20
                                                        • Instruction ID: 74e827807b5933783b4f446df102fc9f584a6e16a09b2846fd0e4cf1e86476bd
                                                        • Opcode Fuzzy Hash: af1a0ac280b1e9ce57dac687583498f5eb63187f42e28c3b7a68ce0c593e6c20
                                                        • Instruction Fuzzy Hash: 7011A070604244AFDB04DBFCC89CBED7BB89F61304F408499D615AB291DB30DA46CF40
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E953F7B
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E953F8D
                                                        • VariantInit.OLEAUT32(?), ref: 6E953FB7
                                                        • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E953FD0
                                                        • VariantClear.OLEAUT32(?), ref: 6E9540C9
                                                        • VariantClear.OLEAUT32(?), ref: 6E954105
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E954123
                                                        • VariantClear.OLEAUT32(?), ref: 6E954157
                                                        • VariantClear.OLEAUT32(?), ref: 6E954168
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ArrayClearSafe$Bound$DestroyElementInit
                                                        • String ID:
                                                        • API String ID: 758290628-0
                                                        • Opcode ID: 4f59855e0a8381ef3ff63444a60ab956964d728a02ec65304a0b57dfde561f33
                                                        • Instruction ID: 42d5bed38e5f0fb7e0fa089fac6eeb4e2fa584eb2cf197057434692d4026274a
                                                        • Opcode Fuzzy Hash: 4f59855e0a8381ef3ff63444a60ab956964d728a02ec65304a0b57dfde561f33
                                                        • Instruction Fuzzy Hash: 627159765083429FC740DFA8C88495BBBE8BFA9304F144A2CF59687350D735E956CF92
                                                        APIs
                                                        • UnmapViewOfFile.KERNEL32(00000000,?,?,00000000,64F62E83), ref: 6E93FC98
                                                        • CloseHandle.KERNEL32(FFFFFFFF,?,?,00000000,64F62E83), ref: 6E93FCAD
                                                        • CloseHandle.KERNEL32(?,?,?,00000000,64F62E83), ref: 6E93FCB7
                                                        • SetLastError.KERNEL32(00000000,?,?,00000000,64F62E83), ref: 6E93FCBA
                                                        • CreateFileW.KERNEL32(?,-00000001,00000001,00000000,00000003,00000000,00000000,?,?,00000000,64F62E83), ref: 6E93FD01
                                                        • GetFileSizeEx.KERNEL32(00000000,?,?,?,00000000,64F62E83), ref: 6E93FD14
                                                        • GetLastError.KERNEL32(?,?,00000000,64F62E83), ref: 6E93FD2A
                                                        • CreateFileMappingW.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,00000000,64F62E83), ref: 6E93FD6B
                                                        • MapViewOfFile.KERNEL32(00000000,?,00000000,00000000,00000000,?,?,00000000,64F62E83), ref: 6E93FD98
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateErrorHandleLastView$MappingSizeUnmap
                                                        • String ID:
                                                        • API String ID: 1303881157-0
                                                        • Opcode ID: 57dcdf99de7f3655a42e3ce5a555a829a8c20d43037de85235763d6e8d76b1ee
                                                        • Instruction ID: 19c7df42481189a9cd925a264c19ed917cb52ee8c1e1a90d4afacb59fffc1679
                                                        • Opcode Fuzzy Hash: 57dcdf99de7f3655a42e3ce5a555a829a8c20d43037de85235763d6e8d76b1ee
                                                        • Instruction Fuzzy Hash: 9451C6B5A44311AFDB008FB5C894B9677A9AF89324F348659EC15CF2C5E770DC028FA0
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E9942DD
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E994363
                                                        • _memmove.LIBCMT ref: 6E994381
                                                        • _memmove.LIBCMT ref: 6E9943E6
                                                        • _memmove.LIBCMT ref: 6E994453
                                                        • _memmove.LIBCMT ref: 6E994474
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                        • String ID: vector<T> too long
                                                        • API String ID: 4034224661-3788999226
                                                        • Opcode ID: f4cdbfcb88072ff8e35f871144f1415dcd0050107af58ace4dd2cfd23798995f
                                                        • Instruction ID: 5829f788d89dd52d9d2db85186a7fe9186dc2a1a356936993ebf0f363b3dad0d
                                                        • Opcode Fuzzy Hash: f4cdbfcb88072ff8e35f871144f1415dcd0050107af58ace4dd2cfd23798995f
                                                        • Instruction Fuzzy Hash: CA517FB26043068FD718CFB8DD8596BB7E9EFD8214F184E2DE856C3344E671E905CAA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                        • String ID: invalid string position$string too long
                                                        • API String ID: 2168136238-4289949731
                                                        • Opcode ID: a50eb0b75da4c72d5185a057f5fda5707009bbd203e16535d447c614cdca4227
                                                        • Instruction ID: dc270a2c0c292b0068a8f88f85d5e912bbfe9f6a5770b8a8121231120dbafd9f
                                                        • Opcode Fuzzy Hash: a50eb0b75da4c72d5185a057f5fda5707009bbd203e16535d447c614cdca4227
                                                        • Instruction Fuzzy Hash: DF4151323046118BF6249EEDD8A0AAEB3EAEFD5714B210D2FE051C7750C765D8868F61
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID: RSDi
                                                        • API String ID: 4225690600-559181253
                                                        • Opcode ID: feb76103f3b62b65e8bb53e5f82f87213ad95d3b9050e3ed16d54e8e7ef2db9c
                                                        • Instruction ID: e8474b0c4db5c720a6fc8c4790f8a54cfeceba9e279378f926eec92a7902b749
                                                        • Opcode Fuzzy Hash: feb76103f3b62b65e8bb53e5f82f87213ad95d3b9050e3ed16d54e8e7ef2db9c
                                                        • Instruction Fuzzy Hash: FA413A74A006059FDB40DFA9C990A5AB7BEAF89304F24858AE909DB355DB31E841CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID: RSUa
                                                        • API String ID: 4225690600-2086061799
                                                        • Opcode ID: bd1ae2aae78e863b21e419fdd30738c0d17b671aecd8fe9a81e8c51e8a096d2e
                                                        • Instruction ID: 5c4194f487fc1d0415851e7e2ed8aa25b833f010d974660c4920abcdb9afc6dd
                                                        • Opcode Fuzzy Hash: bd1ae2aae78e863b21e419fdd30738c0d17b671aecd8fe9a81e8c51e8a096d2e
                                                        • Instruction Fuzzy Hash: DA311770A006199FDB40DFA9C990BAEB7BDAF89300F20859AE918E7351D771E981CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID: RSqb
                                                        • API String ID: 4225690600-347567867
                                                        • Opcode ID: 32505c103d67737cb17c97c96cfc87436de3855ea234337a3e827c4ba9c875f6
                                                        • Instruction ID: bd2df473b80169ce70a86bd3254de3f8b135be40b555a516f994448f58c98149
                                                        • Opcode Fuzzy Hash: 32505c103d67737cb17c97c96cfc87436de3855ea234337a3e827c4ba9c875f6
                                                        • Instruction Fuzzy Hash: FA312A70A006199FDB40DFA9CD90BAEB7BDAF89200F20859AE518E7351D775D9418F50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID: RSa
                                                        • API String ID: 4225690600-3169278968
                                                        • Opcode ID: 98cd5df467629adcf8d1bfaa3b2e00de6eb1d83a2dd71279b8af44b74062df78
                                                        • Instruction ID: e9fe06c2bc88a8fd4b3fcf7fe1e9f5a8312ac8d1542d383ce343aed4df244edf
                                                        • Opcode Fuzzy Hash: 98cd5df467629adcf8d1bfaa3b2e00de6eb1d83a2dd71279b8af44b74062df78
                                                        • Instruction Fuzzy Hash: 23312870A006199FDB40DFA9CD90BAEB7BDAF89200F20859AE818EB351D771E9418F50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID: RS3g
                                                        • API String ID: 4225690600-2794631155
                                                        • Opcode ID: 456b1ce340ca56cdde74cb35f19e8752a13726eebbaa80fc798a6fba95b4fcbc
                                                        • Instruction ID: 951fc2a922b208940f6e99724c225965f58bae1fc46818cba4f10bec85c5cd53
                                                        • Opcode Fuzzy Hash: 456b1ce340ca56cdde74cb35f19e8752a13726eebbaa80fc798a6fba95b4fcbc
                                                        • Instruction Fuzzy Hash: 39313C70E006199FDB40DFA9CD90BAEB7BDAF89200F248696E418EB355DB71E941CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID: RS:h
                                                        • API String ID: 4225690600-3891202347
                                                        • Opcode ID: 5fe2962b20dd63aed4c4b9c2d032230e54d65dfbdb616ca51d2cd9f14b6c0e0d
                                                        • Instruction ID: 91d4c30f2b2eb6ee3e335e0ef4d936bc5e46e633bab95306b497e24e1cb811b4
                                                        • Opcode Fuzzy Hash: 5fe2962b20dd63aed4c4b9c2d032230e54d65dfbdb616ca51d2cd9f14b6c0e0d
                                                        • Instruction Fuzzy Hash: 45312A70E006099FDB50DFA9CC90B6EB7BDAF89200F248596E418E7355D771E9418F50
                                                        APIs
                                                        • type_info::operator!=.LIBCMT ref: 6E98C7EB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: type_info::operator!=
                                                        • String ID: ModPrime1PrivateExponent$ModPrime2PrivateExponent$MultiplicativeInverseOfPrime2ModPrime1$Prime1$Prime2$PrivateExponent
                                                        • API String ID: 2241493438-339133643
                                                        • Opcode ID: f25a3fd31c15a65b12fec4e62f28fa0bd2df458563daee5a5c3952d3f405ec91
                                                        • Instruction ID: fcc7279d6626a23f2b8e6317690c5e34dd65ccf432803b4501b54e866de851cf
                                                        • Opcode Fuzzy Hash: f25a3fd31c15a65b12fec4e62f28fa0bd2df458563daee5a5c3952d3f405ec91
                                                        • Instruction Fuzzy Hash: 0E3149709143449EC7449FB8C94558BBBF5AFD5608F444E2EF589AB360EB70D848CF92
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID: RS%e
                                                        • API String ID: 4225690600-1409579784
                                                        • Opcode ID: 6d6022442d1da83946293fd45c58df6cc1735773d0b51fb684561cfed02c37f6
                                                        • Instruction ID: 0db3399afad7896db07fed1b0e0bd83037e68fc765794fbf75c38260676a7944
                                                        • Opcode Fuzzy Hash: 6d6022442d1da83946293fd45c58df6cc1735773d0b51fb684561cfed02c37f6
                                                        • Instruction Fuzzy Hash: 29311870A006189FDB50DFA9CC80BADB7BEAF85700F24859AE518E7351D775D9418F50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID:
                                                        • API String ID: 2610073882-0
                                                        • Opcode ID: 169816b4e9f4ad8db2cc5e1545aed3fb73d9786865337ca0698213735ce8527a
                                                        • Instruction ID: 087f51104fb9526ff1b49c3b19971b362f212d9bd0398e6ebe5339bfce58ece5
                                                        • Opcode Fuzzy Hash: 169816b4e9f4ad8db2cc5e1545aed3fb73d9786865337ca0698213735ce8527a
                                                        • Instruction Fuzzy Hash: ACC13371608B01DFC340DFA8C880D5BB7EABFD8204F248A5DE5989B264E774E845CF92
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E949DEB
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E949DFB
                                                        • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E949E29
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E949F25
                                                        • VariantClear.OLEAUT32(?), ref: 6E949FE5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                                        • String ID: @
                                                        • API String ID: 3214203402-2766056989
                                                        • Opcode ID: 7063a6e82f83282df81ed27ecc33c33b175c3479fbeb0489238db6687bf93166
                                                        • Instruction ID: d4b3879f238302ace81d09a9b4f26bbeccc2b9f904c1f11e0af88fcd5af47cba
                                                        • Opcode Fuzzy Hash: 7063a6e82f83282df81ed27ecc33c33b175c3479fbeb0489238db6687bf93166
                                                        • Instruction Fuzzy Hash: FCD14871D0024ACFDB00DFE8C984AADBBB9BF89304F2485A9E515AB254D771EE45CF90
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E94B3EB
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E94B3FB
                                                        • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E94B429
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E94B525
                                                        • VariantClear.OLEAUT32(?), ref: 6E94B5E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Bound$ClearDestroyElementVariant
                                                        • String ID: @
                                                        • API String ID: 3214203402-2766056989
                                                        • Opcode ID: f29acbe0e409b3e941d94b387b9c50fe2e9f5529562798c7f4d19b73975ba1cc
                                                        • Instruction ID: 5b4f3268c63946d5167f3c71d7c96b73c754016ef1df33bc8da6220381a12dd0
                                                        • Opcode Fuzzy Hash: f29acbe0e409b3e941d94b387b9c50fe2e9f5529562798c7f4d19b73975ba1cc
                                                        • Instruction Fuzzy Hash: 1CD14A71D0024ACFDB04DFE8C890A9DBBB9BF88314F248559E515AB358E730EA45CF90
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E9716B2
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • __CxxThrowException@8.LIBCMT ref: 6E97180A
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        Strings
                                                        • exceeds the maximum of , xrefs: 6E97173F
                                                        • : message length of , xrefs: 6E97170D
                                                        • for this public key, xrefs: 6E971771
                                                        • : this key is too short to encrypt any messages, xrefs: 6E97162A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaiseXinvalid_argumentstd::_
                                                        • String ID: exceeds the maximum of $ for this public key$: message length of $: this key is too short to encrypt any messages
                                                        • API String ID: 3807434085-412673420
                                                        • Opcode ID: edfb4b0d10971b78dfcfe22aea23a45b9193a36ce05cd53fb8ba3a0f5d6239ff
                                                        • Instruction ID: d4d3c38b49b3930843370d3e4e92835b6ec243091a2c57d4b121d9b8e950a3bb
                                                        • Opcode Fuzzy Hash: edfb4b0d10971b78dfcfe22aea23a45b9193a36ce05cd53fb8ba3a0f5d6239ff
                                                        • Instruction Fuzzy Hash: ACB14C715083809FD324DBA9C890BDBB7E9AFDA304F04491DE58D87351EB71A909CFA2
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E99126E
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E9912E0
                                                        • _memmove.LIBCMT ref: 6E991305
                                                        • _memmove.LIBCMT ref: 6E991342
                                                        • _memmove.LIBCMT ref: 6E99135F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                        • String ID: deque<T> too long
                                                        • API String ID: 4034224661-309773918
                                                        • Opcode ID: 2179f9e37dd865ff42b8ebc0b2b1a2ec69c8c464345cd5c6d59a56cf415475ed
                                                        • Instruction ID: 77c7135b7af796f30f280eba0c1850f8fa14034ff9da871cd002b27362e39262
                                                        • Opcode Fuzzy Hash: 2179f9e37dd865ff42b8ebc0b2b1a2ec69c8c464345cd5c6d59a56cf415475ed
                                                        • Instruction Fuzzy Hash: B641F872A042014FD704CEA9CC9156BB7EEEFD4210F0D8A2DE809D7344FA34ED058BA1
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E9913BE
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E991431
                                                        • _memmove.LIBCMT ref: 6E991456
                                                        • _memmove.LIBCMT ref: 6E991493
                                                        • _memmove.LIBCMT ref: 6E9914B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                        • String ID: deque<T> too long
                                                        • API String ID: 4034224661-309773918
                                                        • Opcode ID: 0c2b36bcfa4b2089159de125157420a699d237144d6b5ca0725f372dae29ae08
                                                        • Instruction ID: cdb6cd7dad374acdc17f89b50f751b056afa1f74d96ab48a908d542ef1c39e7c
                                                        • Opcode Fuzzy Hash: 0c2b36bcfa4b2089159de125157420a699d237144d6b5ca0725f372dae29ae08
                                                        • Instruction Fuzzy Hash: A941D872A042054FD704CEA9DC9156BB7EEEFD4214F0E8A2DE849D7344EB74ED098BA1
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934DA9
                                                          • Part of subcall function 6E999125: std::exception::exception.LIBCMT ref: 6E99913A
                                                          • Part of subcall function 6E999125: __CxxThrowException@8.LIBCMT ref: 6E99914F
                                                          • Part of subcall function 6E999125: std::exception::exception.LIBCMT ref: 6E999160
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934DCA
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934DE5
                                                        • _memmove.LIBCMT ref: 6E934E4D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw_memmove
                                                        • String ID: invalid string position$string too long
                                                        • API String ID: 443534600-4289949731
                                                        • Opcode ID: c0eada73600d1920894812a602a5f2e91f0dc047f81ef3272f110dca4ea8f2ff
                                                        • Instruction ID: 4161bf36a15b07000f948b3c2e19f1ee0e29b88ae09b58cae87f681c7d86f20e
                                                        • Opcode Fuzzy Hash: c0eada73600d1920894812a602a5f2e91f0dc047f81ef3272f110dca4ea8f2ff
                                                        • Instruction Fuzzy Hash: 183184323042218FE7258EDCE890A6AB7E9AF90725B310A2FE5658B740D772D8418F91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+$NameName::
                                                        • String ID: throw(
                                                        • API String ID: 168861036-3159766648
                                                        • Opcode ID: e783a6e09ec088b741f65bf662f0f7029220c6f1e22f8238a3a3abcd04a39c15
                                                        • Instruction ID: e15c4f0563e9d71e298ceed4af20e4eb4e5a88118e53b6b7c12f821019aff811
                                                        • Opcode Fuzzy Hash: e783a6e09ec088b741f65bf662f0f7029220c6f1e22f8238a3a3abcd04a39c15
                                                        • Instruction Fuzzy Hash: 0C014C7460010AAFCF04DBECC895DEE7BBEAF94308F504555EA019B294DB70EA468F90
                                                        APIs
                                                        • __getptd_noexit.LIBCMT ref: 6E99CCFA
                                                          • Part of subcall function 6E99EA6D: GetLastError.KERNEL32(?,?,6E99D7DD,6E999DEF,00000000,?,6E999BD4,6E931290,64F62E83), ref: 6E99EA71
                                                          • Part of subcall function 6E99EA6D: ___set_flsgetvalue.LIBCMT ref: 6E99EA7F
                                                          • Part of subcall function 6E99EA6D: __calloc_crt.LIBCMT ref: 6E99EA93
                                                          • Part of subcall function 6E99EA6D: DecodePointer.KERNEL32(00000000,?,?,6E99D7DD,6E999DEF,00000000,?,6E999BD4,6E931290,64F62E83), ref: 6E99EAAD
                                                          • Part of subcall function 6E99EA6D: GetCurrentThreadId.KERNEL32 ref: 6E99EAC3
                                                          • Part of subcall function 6E99EA6D: SetLastError.KERNEL32(00000000,?,?,6E99D7DD,6E999DEF,00000000,?,6E999BD4,6E931290,64F62E83), ref: 6E99EADB
                                                        • __calloc_crt.LIBCMT ref: 6E99CD1C
                                                        • __get_sys_err_msg.LIBCMT ref: 6E99CD3A
                                                        • _strcpy_s.LIBCMT ref: 6E99CD42
                                                        • __invoke_watson.LIBCMT ref: 6E99CD57
                                                        Strings
                                                        • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 6E99CD07, 6E99CD2A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__calloc_crt$CurrentDecodePointerThread___set_flsgetvalue__get_sys_err_msg__getptd_noexit__invoke_watson_strcpy_s
                                                        • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                        • API String ID: 3117964792-798102604
                                                        • Opcode ID: 70875e7f960b9df9ddd337153b07975a412b215c998cf226bd4b2b3b43b78515
                                                        • Instruction ID: 279fcb75adfd28835f26e0a061c62c98964c72353bbe471e8b8e4f79ade78317
                                                        • Opcode Fuzzy Hash: 70875e7f960b9df9ddd337153b07975a412b215c998cf226bd4b2b3b43b78515
                                                        • Instruction Fuzzy Hash: 97F02B735043142BC71025D99C8098F7AECDFE175CB0C0C3AF504AF100E621D8416DB4
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6E9C9880,00000008,6E99EAC1,00000000,00000000,?,?,6E99D7DD,6E999DEF,00000000,?,6E999BD4,6E931290,64F62E83), ref: 6E99E9CA
                                                        • __lock.LIBCMT ref: 6E99E9FE
                                                          • Part of subcall function 6E9A2438: __mtinitlocknum.LIBCMT ref: 6E9A244E
                                                          • Part of subcall function 6E9A2438: __amsg_exit.LIBCMT ref: 6E9A245A
                                                          • Part of subcall function 6E9A2438: EnterCriticalSection.KERNEL32(6E999BD4,6E999BD4,?,6E99EA03,0000000D), ref: 6E9A2462
                                                        • InterlockedIncrement.KERNEL32(FFFFFEF5), ref: 6E99EA0B
                                                        • __lock.LIBCMT ref: 6E99EA1F
                                                        • ___addlocaleref.LIBCMT ref: 6E99EA3D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                                        • String ID: KERNEL32.DLL
                                                        • API String ID: 637971194-2576044830
                                                        • Opcode ID: 028063007d8a3a5a95d20311f9cd78472113b83c85cee20a92e85c309e1f6d94
                                                        • Instruction ID: 950b861d29a962c865ad2ebb49b63353c0622536a5b3234a4f18aa03e26a71f2
                                                        • Opcode Fuzzy Hash: 028063007d8a3a5a95d20311f9cd78472113b83c85cee20a92e85c309e1f6d94
                                                        • Instruction Fuzzy Hash: A6015E71845B00EFD7209FAAC40478AFBE4BFA1318F20890DD595973A0CB70E644DF11
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(00000000,?,?), ref: 6E94E29B
                                                        • SafeArrayGetUBound.OLEAUT32(00000000,?,?), ref: 6E94E2B6
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6E94E2D7
                                                          • Part of subcall function 6E955760: std::tr1::_Xweak.LIBCPMT ref: 6E955769
                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E94E309
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E94E523
                                                        • InterlockedCompareExchange.KERNEL32(6E9DC6A4,45524548,4B4F4F4C), ref: 6E94E544
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$BoundData$AccessCompareDestroyExchangeInterlockedUnaccessXweak_mallocstd::tr1::_
                                                        • String ID:
                                                        • API String ID: 2722669376-0
                                                        • Opcode ID: a9cbeccce987a01880bf662ae3c4edb609bbbb5228b3da0d34c5f3692c18e28a
                                                        • Instruction ID: 634f564a266eaabbe91bb58d248e31a01951e7af6992e122e9a0d847c3787248
                                                        • Opcode Fuzzy Hash: a9cbeccce987a01880bf662ae3c4edb609bbbb5228b3da0d34c5f3692c18e28a
                                                        • Instruction Fuzzy Hash: 73D182B1A00209DFDB11CFE4C894BEEB7BDAF55304F144969E906AB281E774E944CFA1
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: feb76103f3b62b65e8bb53e5f82f87213ad95d3b9050e3ed16d54e8e7ef2db9c
                                                        • Instruction ID: ba3c1e63f380fe8f33bd3c9d8da9c20cd7621c4e334836e07b6bb41331cd9e60
                                                        • Opcode Fuzzy Hash: feb76103f3b62b65e8bb53e5f82f87213ad95d3b9050e3ed16d54e8e7ef2db9c
                                                        • Instruction Fuzzy Hash: AF415774A006099FDB40DFA9CD90A5AB7FEAF89300F20859AE909EB355DB71EC41CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: db67a17a08e96477bd489134a7a4d514f1d848dbf1d3f5e826fe3fb6d8e37a77
                                                        • Instruction ID: 1917d4a1cd14d822baedaa4c9b636079b79a1d81c7780e4e1f9d63d09d39c288
                                                        • Opcode Fuzzy Hash: db67a17a08e96477bd489134a7a4d514f1d848dbf1d3f5e826fe3fb6d8e37a77
                                                        • Instruction Fuzzy Hash: 3C416A70A006199FDB00DFA8CC90B9EB7BDAF89200F24859AE519EB351DB70ED44CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: db67a17a08e96477bd489134a7a4d514f1d848dbf1d3f5e826fe3fb6d8e37a77
                                                        • Instruction ID: 5c32b3ea072e2aeb3345fb46f8ca2deb308ab2be79287ed4afca1ad8f38de7da
                                                        • Opcode Fuzzy Hash: db67a17a08e96477bd489134a7a4d514f1d848dbf1d3f5e826fe3fb6d8e37a77
                                                        • Instruction Fuzzy Hash: 9D413D70A00619DFDB40DFA9CC90BAEB7BDAF89200F24859AE918EB355D771E941CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 736ff64b483fbf4b0d8f944201ddba3b4c04768dbd176d6b145189ca1a50f3c8
                                                        • Instruction ID: cc73fd815beedf358c8a2d041e97cb63704d5ef8e5ea972238d37d84612cca95
                                                        • Opcode Fuzzy Hash: 736ff64b483fbf4b0d8f944201ddba3b4c04768dbd176d6b145189ca1a50f3c8
                                                        • Instruction Fuzzy Hash: CA314A70E006099FDB50CFA8CC90B5EB7BDAF89200F208596E418E7341D775E941CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 456b1ce340ca56cdde74cb35f19e8752a13726eebbaa80fc798a6fba95b4fcbc
                                                        • Instruction ID: 065791656520a333e015dd11bed91e9e1f10a5d5dc2e851d8bfc25b8be07a38f
                                                        • Opcode Fuzzy Hash: 456b1ce340ca56cdde74cb35f19e8752a13726eebbaa80fc798a6fba95b4fcbc
                                                        • Instruction Fuzzy Hash: DB312870E006199FDB50CBA8CC90B9EB7FDAF89200F24869AE419EB355D771E944CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 5fe2962b20dd63aed4c4b9c2d032230e54d65dfbdb616ca51d2cd9f14b6c0e0d
                                                        • Instruction ID: b6d2bfb3370f284b3e794d2c0825e9b92824c6d57566e639e6053a5de862517f
                                                        • Opcode Fuzzy Hash: 5fe2962b20dd63aed4c4b9c2d032230e54d65dfbdb616ca51d2cd9f14b6c0e0d
                                                        • Instruction Fuzzy Hash: 0C312770E006099FDB50DBA8CC90BAEB7BDAF89200F24859AE419E7355D775ED81CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 05400078effeae019b4a182e2dde4a99adca23ab3117dd02918cdbde8d2fd92b
                                                        • Instruction ID: 32da35e3cda875f1d5e95ad77a9721b69369b08bae6f4870b421225b0b0749e9
                                                        • Opcode Fuzzy Hash: 05400078effeae019b4a182e2dde4a99adca23ab3117dd02918cdbde8d2fd92b
                                                        • Instruction Fuzzy Hash: 49314970E006099FDB40CFA9CD90BAEB7BDAF89200F20859AE418EB341DB71E940CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 736ff64b483fbf4b0d8f944201ddba3b4c04768dbd176d6b145189ca1a50f3c8
                                                        • Instruction ID: e0a23c250eccec444f068dccad8188ba6e93664973cd8e3865e82c1a36cf65a1
                                                        • Opcode Fuzzy Hash: 736ff64b483fbf4b0d8f944201ddba3b4c04768dbd176d6b145189ca1a50f3c8
                                                        • Instruction Fuzzy Hash: 79313B70E006099FDB40DFA9CC90BAEB7BDAF89300F208596E918E7351DB75D9418F50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 46ed5a44dbcffa0e60d659cce942d0940e60c28613ed59d0c9545f4474ca6288
                                                        • Instruction ID: 2c0f29c11fd82a4ac56d6e03e4d42c66201ca6b4a8d69c875597cfa6092bb01d
                                                        • Opcode Fuzzy Hash: 46ed5a44dbcffa0e60d659cce942d0940e60c28613ed59d0c9545f4474ca6288
                                                        • Instruction Fuzzy Hash: FE313970E006199FDB40DFA9CD90BAEB7BDAF89200F20859AE818EB351D775E941CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: bd1ae2aae78e863b21e419fdd30738c0d17b671aecd8fe9a81e8c51e8a096d2e
                                                        • Instruction ID: d652b3528e4cf3fc408838d2a773e47775acc7e7ab012241bb5e5984b8852d38
                                                        • Opcode Fuzzy Hash: bd1ae2aae78e863b21e419fdd30738c0d17b671aecd8fe9a81e8c51e8a096d2e
                                                        • Instruction Fuzzy Hash: A6313870E006199FDB50CBA8CC90B9EB7BDAF89200F24858AE419EB355D775ED85CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 98cd5df467629adcf8d1bfaa3b2e00de6eb1d83a2dd71279b8af44b74062df78
                                                        • Instruction ID: fad4f2a16a4fd35fb60aac63fa758609007c534416aeb71688d07dd775ca8b73
                                                        • Opcode Fuzzy Hash: 98cd5df467629adcf8d1bfaa3b2e00de6eb1d83a2dd71279b8af44b74062df78
                                                        • Instruction Fuzzy Hash: B0314870E006099FDB40DBA8CC90B9EB7BDAF89200F20858AE419EB341DB71E941CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 46ed5a44dbcffa0e60d659cce942d0940e60c28613ed59d0c9545f4474ca6288
                                                        • Instruction ID: 49d96cb7f629aeacf7ed8bac64616d51f97b533692004347038ef6de994ae449
                                                        • Opcode Fuzzy Hash: 46ed5a44dbcffa0e60d659cce942d0940e60c28613ed59d0c9545f4474ca6288
                                                        • Instruction Fuzzy Hash: 663139B0E006199FDB50CBA8CC90B9EB7BEAF89200F24858AE519E7351D775ED41CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 32505c103d67737cb17c97c96cfc87436de3855ea234337a3e827c4ba9c875f6
                                                        • Instruction ID: 982cf7e1824381d6959a56d100ff769ed98dfbe6eeaf7141798d3d36df24c467
                                                        • Opcode Fuzzy Hash: 32505c103d67737cb17c97c96cfc87436de3855ea234337a3e827c4ba9c875f6
                                                        • Instruction Fuzzy Hash: 58314770E006199FDB40CBA9CD90B9EB7BDAF89200F20858AE419EB341DB75E944CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 05400078effeae019b4a182e2dde4a99adca23ab3117dd02918cdbde8d2fd92b
                                                        • Instruction ID: d478610755071f1f1488db74e685991c389cd7c4ab5f127658c27862844d54af
                                                        • Opcode Fuzzy Hash: 05400078effeae019b4a182e2dde4a99adca23ab3117dd02918cdbde8d2fd92b
                                                        • Instruction Fuzzy Hash: C1314870E006199FDB40CBA8CC90B9EB7BDAF89200F20859AE419EB341DB71E940CF60
                                                        APIs
                                                        • SafeArrayCreateVector.OLEAUT32(0000000C,00000000,00000001), ref: 6E95C180
                                                        • SafeArrayPutElement.OLEAUT32(00000000,6E953749,?), ref: 6E95C1B8
                                                        • VariantClear.OLEAUT32(?), ref: 6E95C1C4
                                                        • VariantCopy.OLEAUT32(6E953749,?), ref: 6E95C21B
                                                        • VariantClear.OLEAUT32(?), ref: 6E95C22F
                                                        • SafeArrayDestroy.OLEAUT32(00000000), ref: 6E95C23E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafeVariant$Clear$CopyCreateDestroyElementVector
                                                        • String ID:
                                                        • API String ID: 3979206172-0
                                                        • Opcode ID: 9889a48fdc09fdf499176a99d8d2079eccd9db8f9d9928d9bbb2beb95f3f2e3d
                                                        • Instruction ID: 68f92d5255336b4b491815f1bb8d411502a892584d843abee3d9a37d266eef15
                                                        • Opcode Fuzzy Hash: 9889a48fdc09fdf499176a99d8d2079eccd9db8f9d9928d9bbb2beb95f3f2e3d
                                                        • Instruction Fuzzy Hash: 1A311975A04609AFDB04DFE9C894B9FBBB8EF99700F108519E916DB350EA35D9018FA0
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • InitializeCriticalSection.KERNEL32(00000000,?,00000000,00000000,6E9B11FD,000000FF,?,6E948B80,00000000,?,00000000,?,6E948C13,?,?), ref: 6E947415
                                                        • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000,6E9B11FD,000000FF,?,6E948B80,00000000,?,00000000,?,6E948C13,?,?), ref: 6E94741B
                                                        • std::exception::exception.LIBCMT ref: 6E94743D
                                                        • __CxxThrowException@8.LIBCMT ref: 6E947452
                                                        • std::exception::exception.LIBCMT ref: 6E947461
                                                        • __CxxThrowException@8.LIBCMT ref: 6E947476
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8Throw$CriticalInitializeSection$_malloc
                                                        • String ID:
                                                        • API String ID: 189561132-0
                                                        • Opcode ID: f67b8e781324be8e3379e3a694fd3c4d5c7092a2368e405c8c8be62147ce51a8
                                                        • Instruction ID: bd0873cfc6ffca59c73f5b0c3601548ee417fe42a323d4571861e04278193b85
                                                        • Opcode Fuzzy Hash: f67b8e781324be8e3379e3a694fd3c4d5c7092a2368e405c8c8be62147ce51a8
                                                        • Instruction Fuzzy Hash: 2D3149B19006489FC750CF99C880A9AFBF8FF99210B44895AE95697B40E771F504CF61
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 9f58e805cc548c8c6defc77ad322b74b979f864eaf8412bbaf105a383c38a0d8
                                                        • Instruction ID: 843c02e1cd26ac39a73ab0701159b4f9037e853eddc0a8197bd72f1fd3bd9ec1
                                                        • Opcode Fuzzy Hash: 9f58e805cc548c8c6defc77ad322b74b979f864eaf8412bbaf105a383c38a0d8
                                                        • Instruction Fuzzy Hash: B5314970E006189FDB10CBA8CC94B9EB7BDAF89200F24869AE419E7345C7B1ED44CF64
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 6d6022442d1da83946293fd45c58df6cc1735773d0b51fb684561cfed02c37f6
                                                        • Instruction ID: 97f0803daf9bfcbaa2bedc93d21a4415d3cfa543e211561537e994149ce28966
                                                        • Opcode Fuzzy Hash: 6d6022442d1da83946293fd45c58df6cc1735773d0b51fb684561cfed02c37f6
                                                        • Instruction Fuzzy Hash: D8311870E006189FDB50CBA9CC94B9EB7BEAF89200F24859AE519E7341D7B1ED44CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 64bc57beb2a738388241915d1fec202efc12a30cefc5d6605f1f489ad0442745
                                                        • Instruction ID: 03da891162bfe88fd9fe8c6031ce562478c9668ef9cc50c6de3e6b4939c3cb39
                                                        • Opcode Fuzzy Hash: 64bc57beb2a738388241915d1fec202efc12a30cefc5d6605f1f489ad0442745
                                                        • Instruction Fuzzy Hash: 76316C70E006189FDB50DBA9CC90B9EB7BDAF89200F24859AE419E7341C7B1ED44CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 5910c4dec0290212af276d41dd65a7fb6f0eb5bc338a0ffba7681f62b86e5a82
                                                        • Instruction ID: b42215d05e190b73132635c924b52c1452e2e9b934d346044b184bb64bc31f7d
                                                        • Opcode Fuzzy Hash: 5910c4dec0290212af276d41dd65a7fb6f0eb5bc338a0ffba7681f62b86e5a82
                                                        • Instruction Fuzzy Hash: DC315E70E006189FDB10CBA8CC94B9EB7BDAF95200F24869AE419E7345D771ED44CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 2fbdbfd552e6ff72cc8209e375c369948342df42a574adf89cc5b6bad00782c8
                                                        • Instruction ID: f2fc03546a415c7b8d66ae27aae79cbfb102e6ed9f690f686e4310c8ca389d11
                                                        • Opcode Fuzzy Hash: 2fbdbfd552e6ff72cc8209e375c369948342df42a574adf89cc5b6bad00782c8
                                                        • Instruction Fuzzy Hash: AF316AB0E006189FDB50DBA8CC90B9EB7BDAF99200F24858AE419E7341C7B1ED45CF60
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: f7bc8456c4e938b1cdfaed959d19c9dc76dc6a1fbf841bfd63884ae61e2ef730
                                                        • Instruction ID: f1fcecd1894832c99e49b06e0891726f5b120a7da79ddede16d3b03d014787d0
                                                        • Opcode Fuzzy Hash: f7bc8456c4e938b1cdfaed959d19c9dc76dc6a1fbf841bfd63884ae61e2ef730
                                                        • Instruction Fuzzy Hash: CD314C70E006189FDB50CBA9CC90B9EB7BEAF99200F24859AE419E7341D7B1ED45CF64
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 469fec16257b32822aa30d47775903b541fe6c47be79f4b82d17240457db60dc
                                                        • Instruction ID: 872e92e18f3a1e818dee193449581b5190bf2a5a7339c623db1864a5cd3f7a4b
                                                        • Opcode Fuzzy Hash: 469fec16257b32822aa30d47775903b541fe6c47be79f4b82d17240457db60dc
                                                        • Instruction Fuzzy Hash: FF313A70E006189FDB50DFA9CC90B9DB7BDAF89700F24859AE418E7342D771D9818F50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 5910c4dec0290212af276d41dd65a7fb6f0eb5bc338a0ffba7681f62b86e5a82
                                                        • Instruction ID: f86a4546070133f1fd4baca75b4f3e90f0d61ba154cab742484bcb6fe22206a9
                                                        • Opcode Fuzzy Hash: 5910c4dec0290212af276d41dd65a7fb6f0eb5bc338a0ffba7681f62b86e5a82
                                                        • Instruction Fuzzy Hash: 4C312B70E006189FDB50CFA9CC80BADB7BDAF85600F64869AE819E7345D771D941CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 9f58e805cc548c8c6defc77ad322b74b979f864eaf8412bbaf105a383c38a0d8
                                                        • Instruction ID: 94e3e1413fcc35aa7b16177c96e4ab590c70d200af472781a155691ac51aed47
                                                        • Opcode Fuzzy Hash: 9f58e805cc548c8c6defc77ad322b74b979f864eaf8412bbaf105a383c38a0d8
                                                        • Instruction Fuzzy Hash: 57312970E006189FDB50CFA9CC90BADB7BDAF89600F24869AE418E7355DB71E981CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 2fbdbfd552e6ff72cc8209e375c369948342df42a574adf89cc5b6bad00782c8
                                                        • Instruction ID: 079936aff4b4b6ab65392fa637bd141f399bf10a05f93b3164bf8b141b738adf
                                                        • Opcode Fuzzy Hash: 2fbdbfd552e6ff72cc8209e375c369948342df42a574adf89cc5b6bad00782c8
                                                        • Instruction Fuzzy Hash: A0312970E006189FDB50DFA9CC80BADB7BEAF95600F24859AE818E7341DB71D981CF50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 64bc57beb2a738388241915d1fec202efc12a30cefc5d6605f1f489ad0442745
                                                        • Instruction ID: 53844a912e275a1d0befc68bfd5318aecef9bb8d615b344ba3e3cd2279c39c26
                                                        • Opcode Fuzzy Hash: 64bc57beb2a738388241915d1fec202efc12a30cefc5d6605f1f489ad0442745
                                                        • Instruction Fuzzy Hash: 01312970E006189FDB50DFA9CC90BADB7BEAF95600F24859AE418E7342D771E9818F50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: f7bc8456c4e938b1cdfaed959d19c9dc76dc6a1fbf841bfd63884ae61e2ef730
                                                        • Instruction ID: d89666640fe0f5fc3f307584f21adc44b2a1da7becb810f47c347955d9eb390f
                                                        • Opcode Fuzzy Hash: f7bc8456c4e938b1cdfaed959d19c9dc76dc6a1fbf841bfd63884ae61e2ef730
                                                        • Instruction Fuzzy Hash: 80310970E006189FDB50DFA9CC90B9DB7BDAF99600F24859AE418EB341D771E9418F50
                                                        APIs
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArrayDestroySafe
                                                        • String ID:
                                                        • API String ID: 4225690600-0
                                                        • Opcode ID: 469fec16257b32822aa30d47775903b541fe6c47be79f4b82d17240457db60dc
                                                        • Instruction ID: ce1977f0494134885cb508b044571269c8923a8b8b863cc4afb43cff6d449536
                                                        • Opcode Fuzzy Hash: 469fec16257b32822aa30d47775903b541fe6c47be79f4b82d17240457db60dc
                                                        • Instruction Fuzzy Hash: FC314EB0E006189FDB50DBA9CC90B9EB7BDAF89200F24858AE419E7345D7B1DD44CF50
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000100,?,?,?,?,?,6E9A25B1,?,00000000,?), ref: 6E9A24E6
                                                        • _malloc.LIBCMT ref: 6E9A251B
                                                        • _memset.LIBCMT ref: 6E9A253B
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,?,00000001,?,00000000,00000001,00000000), ref: 6E9A2550
                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6E9A255E
                                                        • __freea.LIBCMT ref: 6E9A2568
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$StringType__freea_malloc_memset
                                                        • String ID:
                                                        • API String ID: 525495869-0
                                                        • Opcode ID: 253635d530b4b17971575d4d658f6cf048ebe239e791ce77503762fa42e2c319
                                                        • Instruction ID: 31b545999184118e4e72bae2292d0c010b6d4ef7a6f2ddf3fce582716bf11a5c
                                                        • Opcode Fuzzy Hash: 253635d530b4b17971575d4d658f6cf048ebe239e791ce77503762fa42e2c319
                                                        • Instruction Fuzzy Hash: 8D312AB160020AAFEB019FAADC909AE7BADEF48254F114829FA1597250E734DD509F60
                                                        APIs
                                                          • Part of subcall function 6E9569C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E956A08
                                                          • Part of subcall function 6E9569C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E956A15
                                                          • Part of subcall function 6E9569C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E956A41
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Destroy$Bound$Element
                                                        • String ID:
                                                        • API String ID: 757764206-0
                                                        • Opcode ID: 31a9a23a6f3df677fad2f046e8e2ae73c212ea26b851f69bbbf2ad4888b4ce0a
                                                        • Instruction ID: 9a9cef0d7b86e09730c1785aaaab0adfbcbac43c9bc70e7739e01b62df06dce4
                                                        • Opcode Fuzzy Hash: 31a9a23a6f3df677fad2f046e8e2ae73c212ea26b851f69bbbf2ad4888b4ce0a
                                                        • Instruction Fuzzy Hash: 9D312C70E006189FDB50DBA8CC90B9EB7BDAF95200F64468AE419E7341C7B5ED84CF64
                                                        APIs
                                                          • Part of subcall function 6E9569C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E956A08
                                                          • Part of subcall function 6E9569C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E956A15
                                                          • Part of subcall function 6E9569C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E956A41
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE63
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE73
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE86
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AE99
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEAC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95AEBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Destroy$Bound$Element
                                                        • String ID:
                                                        • API String ID: 757764206-0
                                                        • Opcode ID: 7b0dd3582b56515fce74bc5d929eef42f630b808a827719f6d6b344a25501fe6
                                                        • Instruction ID: 7c8702476a02e3d57ff0a5abf4b6ddf099057e8a0001eb2af9fc19b8ffc6ff2a
                                                        • Opcode Fuzzy Hash: 7b0dd3582b56515fce74bc5d929eef42f630b808a827719f6d6b344a25501fe6
                                                        • Instruction Fuzzy Hash: 35314A70E006189FDB10CBA8CC90B9EB7BEAF95200F24498AE419E7341D7B5ED84CF60
                                                        APIs
                                                          • Part of subcall function 6E9569C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E956A08
                                                          • Part of subcall function 6E9569C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E956A15
                                                          • Part of subcall function 6E9569C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E956A41
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Destroy$Bound$Element
                                                        • String ID:
                                                        • API String ID: 757764206-0
                                                        • Opcode ID: 31a9a23a6f3df677fad2f046e8e2ae73c212ea26b851f69bbbf2ad4888b4ce0a
                                                        • Instruction ID: f6618a1e2df46fe4fbdea452bc2aadabccbd24579886e14d675c2a5d15857cbd
                                                        • Opcode Fuzzy Hash: 31a9a23a6f3df677fad2f046e8e2ae73c212ea26b851f69bbbf2ad4888b4ce0a
                                                        • Instruction Fuzzy Hash: 27312870E006189FDB50DFA9CC90B9DB7BEAF99700F24469AE419EB341C775E9808F50
                                                        APIs
                                                          • Part of subcall function 6E9569C0: SafeArrayGetLBound.OLEAUT32(?,00000001,00000000), ref: 6E956A08
                                                          • Part of subcall function 6E9569C0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E956A15
                                                          • Part of subcall function 6E9569C0: SafeArrayGetElement.OLEAUT32(?,?,?), ref: 6E956A41
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523B3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523C3
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523D6
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523E9
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E9523FC
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95240F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Destroy$Bound$Element
                                                        • String ID:
                                                        • API String ID: 757764206-0
                                                        • Opcode ID: 7b0dd3582b56515fce74bc5d929eef42f630b808a827719f6d6b344a25501fe6
                                                        • Instruction ID: 6a2b9e6059c3d194d90c1b1bc2918bc4ea4331617b4ffb2302667911205fde8e
                                                        • Opcode Fuzzy Hash: 7b0dd3582b56515fce74bc5d929eef42f630b808a827719f6d6b344a25501fe6
                                                        • Instruction Fuzzy Hash: 68312970E006189FDB10DFA9CC90B9DB7BEAF95700F24458AE418E7341D775D9808F50
                                                        APIs
                                                          • Part of subcall function 6E934760: __CxxThrowException@8.LIBCMT ref: 6E9347F9
                                                        • _memmove.LIBCMT ref: 6E990907
                                                        • _memmove.LIBCMT ref: 6E990936
                                                        • _memmove.LIBCMT ref: 6E990959
                                                        • __CxxThrowException@8.LIBCMT ref: 6E990A25
                                                        Strings
                                                        • PSSR_MEM: message recovery disabled, xrefs: 6E9909E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Exception@8Throw
                                                        • String ID: PSSR_MEM: message recovery disabled
                                                        • API String ID: 2655171816-3051149714
                                                        • Opcode ID: bbd2108068f4a1e24b8ae6fdbad9f19408b92c734e48a5368dd9ea1cb072b00c
                                                        • Instruction ID: 7579c809023931a3a76d3ee0b30dc1eef382377ae1b21055f95ca828153d4e29
                                                        • Opcode Fuzzy Hash: bbd2108068f4a1e24b8ae6fdbad9f19408b92c734e48a5368dd9ea1cb072b00c
                                                        • Instruction Fuzzy Hash: C9C189702083419FD754CF68C890B6BB7E9AFC9304F048A1CE5998B385E775E945CFA2
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E9980EA
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                                        • String ID: Max$Min$RandomNumberType$invalid bit length
                                                        • API String ID: 3718517217-2498579642
                                                        • Opcode ID: 320629a46c6f7355b6cc2c4476e3f0c049d33cee07d82af54ac60be341714f83
                                                        • Instruction ID: 35956edd8b61db21f91c00b8cc7c517f4b344dcfef2067b580655b6cc851d1cd
                                                        • Opcode Fuzzy Hash: 320629a46c6f7355b6cc2c4476e3f0c049d33cee07d82af54ac60be341714f83
                                                        • Instruction Fuzzy Hash: A8C191715087809EE338C7A8C850B9FB7D9AFEA204F484E1DE59983391DB74D904CB63
                                                        APIs
                                                        • __CreateFrameInfo.LIBCMT ref: 6E99BEB6
                                                          • Part of subcall function 6E99AB70: __getptd.LIBCMT ref: 6E99AB7E
                                                          • Part of subcall function 6E99AB70: __getptd.LIBCMT ref: 6E99AB8C
                                                        • __getptd.LIBCMT ref: 6E99BEC0
                                                          • Part of subcall function 6E99EAE6: __getptd_noexit.LIBCMT ref: 6E99EAE9
                                                          • Part of subcall function 6E99EAE6: __amsg_exit.LIBCMT ref: 6E99EAF6
                                                        • __getptd.LIBCMT ref: 6E99BECE
                                                        • __getptd.LIBCMT ref: 6E99BEDC
                                                        • __getptd.LIBCMT ref: 6E99BEE7
                                                        • _CallCatchBlock2.LIBCMT ref: 6E99BF0D
                                                          • Part of subcall function 6E99AC15: __CallSettingFrame@12.LIBCMT ref: 6E99AC61
                                                          • Part of subcall function 6E99BFB4: __getptd.LIBCMT ref: 6E99BFC3
                                                          • Part of subcall function 6E99BFB4: __getptd.LIBCMT ref: 6E99BFD1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1602911419-0
                                                        • Opcode ID: e4592e34591871a0dd77284131183d31702761ed2f6d3e811dae24ef7e512112
                                                        • Instruction ID: 52cd4d67c0ec2a33ed03a2eb643ecb09c52b51ed6038c78bbbf75cc236454a0b
                                                        • Opcode Fuzzy Hash: e4592e34591871a0dd77284131183d31702761ed2f6d3e811dae24ef7e512112
                                                        • Instruction Fuzzy Hash: FB11E4B1C01209AFDB00DFE4C544ADEBBB4FF54318F148869F814AB260EB789A50AF50
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E967267
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw
                                                        • String ID: exceeds the maximum of $ is less than the minimum of $: IV length
                                                        • API String ID: 2005118841-1273958906
                                                        • Opcode ID: 3fe516e4fb7cf333259dae3330312289b93f4fb24ad3c9f11c8ef0fb988d0ec6
                                                        • Instruction ID: 61adaf78a478e83fddd4e4edc5c6d7e0e905111c7662fd877ca1c406c2a48d17
                                                        • Opcode Fuzzy Hash: 3fe516e4fb7cf333259dae3330312289b93f4fb24ad3c9f11c8ef0fb988d0ec6
                                                        • Instruction Fuzzy Hash: 9B617271108380AFD321DBA9C884FDBB7ECAFE9304F054A1DE58987241EB7599058FA2
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _strncmptype_info::operator!=
                                                        • String ID: ThisPointer:$ValueNames
                                                        • API String ID: 1333309372-2375088429
                                                        • Opcode ID: dad402706f64fd9337d8ccf7293f799ce97f2fb371a636e8f62a392afb145683
                                                        • Instruction ID: 14846b3623a11f9757d8cc605e6c052e5d24fd8445d21caaf87fac3d85d4d386
                                                        • Opcode Fuzzy Hash: dad402706f64fd9337d8ccf7293f799ce97f2fb371a636e8f62a392afb145683
                                                        • Instruction Fuzzy Hash: 3751D0B52087405FC3548EE4C890A67B7FEAF96748F084E1DE4968B3A5D762E8098F52
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _strncmptype_info::operator!=
                                                        • String ID: ThisPointer:$ValueNames
                                                        • API String ID: 1333309372-2375088429
                                                        • Opcode ID: 973de714c86ec53ba905ef971d9daa8bb3a529ec37ee45053577b349f270d8f7
                                                        • Instruction ID: d2a4e9f47adf7defb8f4c4ad22d81f212cc37b1d2939d215d8763fde53720468
                                                        • Opcode Fuzzy Hash: 973de714c86ec53ba905ef971d9daa8bb3a529ec37ee45053577b349f270d8f7
                                                        • Instruction Fuzzy Hash: FC5105312083505FE310DFE4D890A67B7EEAFD6748F044A5EE4D68B351D7A2E8098F52
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _strncmptype_info::operator!=
                                                        • String ID: ThisPointer:$ValueNames
                                                        • API String ID: 1333309372-2375088429
                                                        • Opcode ID: 3e609cb8378926bf3c700f82007cfa848083bf423000bfc7d586ae65095c8c4d
                                                        • Instruction ID: 34d5454a3a4955e4d87afed4ad0dd9f13a5f4fe2cf37b2cd072d409e5c84c683
                                                        • Opcode Fuzzy Hash: 3e609cb8378926bf3c700f82007cfa848083bf423000bfc7d586ae65095c8c4d
                                                        • Instruction Fuzzy Hash: 1351D7352087446BC3148FE5C890A67B7FE9FD6658F084E1DE4D68B369E722E809CF52
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E971C1A
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • __CxxThrowException@8.LIBCMT ref: 6E971CDE
                                                        • __CxxThrowException@8.LIBCMT ref: 6E971D3E
                                                        Strings
                                                        • TF_SignerBase: the recoverable message part is too long for the given key and algorithm, xrefs: 6E971CF0
                                                        • TF_SignerBase: this algorithm does not support messsage recovery or the key is too short, xrefs: 6E971C67
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: TF_SignerBase: the recoverable message part is too long for the given key and algorithm$TF_SignerBase: this algorithm does not support messsage recovery or the key is too short
                                                        • API String ID: 3476068407-3371871069
                                                        • Opcode ID: 35915a48f6025838a31772e702b135e60c6c6ab4fa8ca1ad542989f2bb858de6
                                                        • Instruction ID: e2e25029c56582ab1306a30d622df62968bd85f45118d1b5713b59155bb2720b
                                                        • Opcode Fuzzy Hash: 35915a48f6025838a31772e702b135e60c6c6ab4fa8ca1ad542989f2bb858de6
                                                        • Instruction Fuzzy Hash: A4514C752087409FD364DFA8C880F9BB7E9BFD8604F108A1DE58987391DB70E9058FA2
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                          • Part of subcall function 6E999125: std::exception::exception.LIBCMT ref: 6E99913A
                                                          • Part of subcall function 6E999125: __CxxThrowException@8.LIBCMT ref: 6E99914F
                                                          • Part of subcall function 6E999125: std::exception::exception.LIBCMT ref: 6E999160
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934067
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E9340C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_$_memmove
                                                        • String ID: invalid string position$string too long
                                                        • API String ID: 1615890066-4289949731
                                                        • Opcode ID: 323b2b23ec7bb9dc62de957409ea011f3c5d5ab837949df1b66b294d73306330
                                                        • Instruction ID: 438dd2b56e389e99b65361d80acfe8946dac25f1c46c839f2c6183550411ac85
                                                        • Opcode Fuzzy Hash: 323b2b23ec7bb9dc62de957409ea011f3c5d5ab837949df1b66b294d73306330
                                                        • Instruction Fuzzy Hash: BD31B8723046259BD7218E9CE880A5EF7A9DFD1668F31092FE151CB250D763DC428FA1
                                                        APIs
                                                        • ___BuildCatchObject.LIBCMT ref: 6E99C24E
                                                          • Part of subcall function 6E99C1A9: ___BuildCatchObjectHelper.LIBCMT ref: 6E99C1DF
                                                        • _UnwindNestedFrames.LIBCMT ref: 6E99C265
                                                        • ___FrameUnwindToState.LIBCMT ref: 6E99C273
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                        • String ID: csm$csm
                                                        • API String ID: 2163707966-3733052814
                                                        • Opcode ID: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                                        • Instruction ID: e4d4e985697f07e9564b2ccee39479015bef7ad7b78d2e17290bc105a061a196
                                                        • Opcode Fuzzy Hash: 2a3f766c9b4dac2ca2754d74b5085f77c001a70fed88627ce95d418e20d78339
                                                        • Instruction Fuzzy Hash: DD01E43140110ABBDF125F91CC45EEE7F6AEF98354F084420BD1819160E77AD9A2EFA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: f9fa292314d77ccc8b33f6b790b8b7ab360916430f13c24b7cfed4ca832cd967
                                                        • Instruction ID: db3de37e68edf24be62387dbf95a959c4eaf7b625442928287458083a32cce3f
                                                        • Opcode Fuzzy Hash: f9fa292314d77ccc8b33f6b790b8b7ab360916430f13c24b7cfed4ca832cd967
                                                        • Instruction Fuzzy Hash: B2915FB1618702DFDB24CF99D990A2BB7E9EF88604F10492DE895C3740E734E9498F92
                                                        APIs
                                                        • SafeArrayGetElement.OLEAUT32(?,?,64F62E83), ref: 6E953C49
                                                        • VariantInit.OLEAUT32(?), ref: 6E953C81
                                                        • VariantClear.OLEAUT32(?), ref: 6E953D26
                                                        • VariantClear.OLEAUT32(?), ref: 6E953D30
                                                        • VariantClear.OLEAUT32(?), ref: 6E953D89
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ArrayElementInitSafe
                                                        • String ID:
                                                        • API String ID: 4110538090-0
                                                        • Opcode ID: 6fcc5b8d60dc3b245617a92b517e9089ca975b71527a282ec25d78e5b2ea886d
                                                        • Instruction ID: 0bdcb8a8763be0b2092589b203e90764b29c227d71c245c5985b42654a6f08cc
                                                        • Opcode Fuzzy Hash: 6fcc5b8d60dc3b245617a92b517e9089ca975b71527a282ec25d78e5b2ea886d
                                                        • Instruction Fuzzy Hash: CE615B72A042499FCB00DFE8C8849EEB7B9EF99310F2485A9E515AB354D731ED45CFA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Timetime$Sleep
                                                        • String ID:
                                                        • API String ID: 4176159691-0
                                                        • Opcode ID: ba3a2850ab1ead14e27a7bc32620529e13b2757aeb74a14fabf70fe667827e38
                                                        • Instruction ID: 42cb4ae1250f93b54457aa2eaf1ef630a7a159722081a8459940245057822753
                                                        • Opcode Fuzzy Hash: ba3a2850ab1ead14e27a7bc32620529e13b2757aeb74a14fabf70fe667827e38
                                                        • Instruction Fuzzy Hash: 03519CB19046559FEB01DFEAC88579EBBB8AF16300F54496AE508DB240E770D988CF92
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • _rand.LIBCMT ref: 6E946DEA
                                                          • Part of subcall function 6E999E0C: __getptd.LIBCMT ref: 6E999E0C
                                                        • std::exception::exception.LIBCMT ref: 6E946E17
                                                        • __CxxThrowException@8.LIBCMT ref: 6E946E2C
                                                        • std::exception::exception.LIBCMT ref: 6E946E3B
                                                        • __CxxThrowException@8.LIBCMT ref: 6E946E50
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8Throw$__getptd_malloc_rand
                                                        • String ID:
                                                        • API String ID: 2791304714-0
                                                        • Opcode ID: 02363f89128ae04c90ee1825dc2e469cffc817a0ba352f445470e686109ba231
                                                        • Instruction ID: c638d644050ee56c1db5b1f0b4f6239a62297178a1c75e372a112ec065417d6d
                                                        • Opcode Fuzzy Hash: 02363f89128ae04c90ee1825dc2e469cffc817a0ba352f445470e686109ba231
                                                        • Instruction Fuzzy Hash: 5F31F4B19007449FC750CFA8C480A8ABBF4FF18314F44896ED85A9BB41E775E604CF61
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 6E947761
                                                        • LeaveCriticalSection.KERNEL32(00000000,?), ref: 6E947782
                                                        • EnterCriticalSection.KERNEL32(00000018), ref: 6E947796
                                                        • LeaveCriticalSection.KERNEL32(00000018), ref: 6E9477CE
                                                        • QueueUserWorkItem.KERNEL32(6E961D50,00000000,00000010), ref: 6E94780C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$ItemQueueUserWork
                                                        • String ID:
                                                        • API String ID: 584243675-0
                                                        • Opcode ID: 751628a41f9171ff0d35652515d918f29d9768657bf9c13cc32f4bf95a78a965
                                                        • Instruction ID: e1abfe2637a823b3e7b3cb8eb4de1d97864533dd5191105cdd7923c3027ab62d
                                                        • Opcode Fuzzy Hash: 751628a41f9171ff0d35652515d918f29d9768657bf9c13cc32f4bf95a78a965
                                                        • Instruction Fuzzy Hash: 3E217F7150560DEFDB40CFA4C994A9BBBF8FF85304F408959E4568B680D730EA49CFA0
                                                        APIs
                                                        • std::exception::exception.LIBCMT ref: 6E935ACB
                                                          • Part of subcall function 6E999533: std::exception::_Copy_str.LIBCMT ref: 6E99954E
                                                        • __CxxThrowException@8.LIBCMT ref: 6E935ABC
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • __CxxThrowException@8.LIBCMT ref: 6E935AE0
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E935B18
                                                        • __CxxThrowException@8.LIBCMT ref: 6E935B2D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$std::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                                        • String ID:
                                                        • API String ID: 921928366-0
                                                        • Opcode ID: b57efdcaa0156322fc062b3e5e5e7d2023165126c989046301f979b128a5df11
                                                        • Instruction ID: 9064e61551391baf88f0061476c8a59cbee68e6172dc011d97e5dec7b560f622
                                                        • Opcode Fuzzy Hash: b57efdcaa0156322fc062b3e5e5e7d2023165126c989046301f979b128a5df11
                                                        • Instruction Fuzzy Hash: C501E1B1810208AFDB04DFE4D8419DF77BCEF65244F148559E909A7140EB74E6049FB2
                                                        APIs
                                                        • __getptd.LIBCMT ref: 6E99F047
                                                          • Part of subcall function 6E99EAE6: __getptd_noexit.LIBCMT ref: 6E99EAE9
                                                          • Part of subcall function 6E99EAE6: __amsg_exit.LIBCMT ref: 6E99EAF6
                                                        • __amsg_exit.LIBCMT ref: 6E99F067
                                                        • __lock.LIBCMT ref: 6E99F077
                                                        • InterlockedDecrement.KERNEL32(?), ref: 6E99F094
                                                        • InterlockedIncrement.KERNEL32(074E1688), ref: 6E99F0BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                        • String ID:
                                                        • API String ID: 4271482742-0
                                                        • Opcode ID: 06918343ac9eae7df2b73bb27fcdd5b1eed48e03f3d6324d22e454adbf4d333d
                                                        • Instruction ID: bf5e6d0f646c17da3f3fc4bc5c7335f6ea67298284ab7037fb138b40072c5faa
                                                        • Opcode Fuzzy Hash: 06918343ac9eae7df2b73bb27fcdd5b1eed48e03f3d6324d22e454adbf4d333d
                                                        • Instruction Fuzzy Hash: BC01A172D05E229BDB119FE584447AEB7ACBF42758F280405F81067284CB34D841EFD2
                                                        APIs
                                                        • __getptd.LIBCMT ref: 6E99F7C8
                                                          • Part of subcall function 6E99EAE6: __getptd_noexit.LIBCMT ref: 6E99EAE9
                                                          • Part of subcall function 6E99EAE6: __amsg_exit.LIBCMT ref: 6E99EAF6
                                                        • __getptd.LIBCMT ref: 6E99F7DF
                                                        • __amsg_exit.LIBCMT ref: 6E99F7ED
                                                        • __lock.LIBCMT ref: 6E99F7FD
                                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 6E99F811
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                        • String ID:
                                                        • API String ID: 938513278-0
                                                        • Opcode ID: 1b711f7f5fdbf2d9dbc83afec91e4b210a583c5c084c87a238b9ac2d48cc3cf6
                                                        • Instruction ID: 3d94cb764efbc2d280b70234116e131445cbc7e32185f8d1d12e356318af7464
                                                        • Opcode Fuzzy Hash: 1b711f7f5fdbf2d9dbc83afec91e4b210a583c5c084c87a238b9ac2d48cc3cf6
                                                        • Instruction Fuzzy Hash: 18F0CD32904A109BDB60ABE98400BDDB6A8BFA072CF380949F410AA2D0CB24D540FE62
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memcpy_s
                                                        • String ID:
                                                        • API String ID: 2001391462-3916222277
                                                        • Opcode ID: 9444f20365b3f4bd8703d7dbc7100713fecc3639b4452d324e370641b4000515
                                                        • Instruction ID: 3065fb5e73eed3fb644e2d96211cb43c269377e692a6f283c7cc877a745a9402
                                                        • Opcode Fuzzy Hash: 9444f20365b3f4bd8703d7dbc7100713fecc3639b4452d324e370641b4000515
                                                        • Instruction Fuzzy Hash: 01C16E756083028FEB64CF68C8906AAB7EAFFC9314F04492DE495C7254E775E949CF42
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memcpy_s_memmove_memset
                                                        • String ID: EncodingParameters
                                                        • API String ID: 4034675494-55378216
                                                        • Opcode ID: 5f230e494a166d11d7292ce81da315720624d1af264b989156c733dcb9765e0f
                                                        • Instruction ID: 1f85cbd987429e8a2ef90e168f71c957761bddcaad55c06eccc2a832755b19dd
                                                        • Opcode Fuzzy Hash: 5f230e494a166d11d7292ce81da315720624d1af264b989156c733dcb9765e0f
                                                        • Instruction Fuzzy Hash: D49198706083819FE314CF68C880B5BBBE9AFDA748F18491DF89887391D771E944CB92
                                                        APIs
                                                          • Part of subcall function 6E98D820: _memmove.LIBCMT ref: 6E98D930
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E9713D4
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                          • Part of subcall function 6E968D80: _malloc.LIBCMT ref: 6E968D8A
                                                          • Part of subcall function 6E968D80: _malloc.LIBCMT ref: 6E968DAF
                                                        Strings
                                                        • doesn't match the required length of , xrefs: 6E971316
                                                        • for this key, xrefs: 6E971348
                                                        • : ciphertext length of , xrefs: 6E9712E4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _malloc$ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                                        • String ID: doesn't match the required length of $ for this key$: ciphertext length of
                                                        • API String ID: 1025790555-2559040249
                                                        • Opcode ID: f21c51b03464d96ff61336a544063ed6845c22c524e6d44069c27bc974c90b7e
                                                        • Instruction ID: b8616a05d5b1bfd3c852f683519b660c9b946b40391e91688493ca67c480fae5
                                                        • Opcode Fuzzy Hash: f21c51b03464d96ff61336a544063ed6845c22c524e6d44069c27bc974c90b7e
                                                        • Instruction Fuzzy Hash: FCA13D715083809FD324CBA9C890BDBB7E9AFD9304F044A1DE59987350EB70E949CFA2
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 6E99B50D
                                                          • Part of subcall function 6E9A1AA0: __87except.LIBCMT ref: 6E9A1ADB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__87except__start
                                                        • String ID: pow
                                                        • API String ID: 2905807303-2276729525
                                                        • Opcode ID: 91a071a62fa9b758ec781bc6dec828f434b836cdb5eeb43a9f7d5f28f8d5a2ff
                                                        • Instruction ID: 2b8ceacd7fca790f1cf6e51d3768744fc5d8d26767b945a2bc208db5aec0fff3
                                                        • Opcode Fuzzy Hash: 91a071a62fa9b758ec781bc6dec828f434b836cdb5eeb43a9f7d5f28f8d5a2ff
                                                        • Instruction Fuzzy Hash: 3F515EA1A1C60296C741AADEC5503AE7BBCDF83714F148D58D5D44229CFB38C8C8AF4B
                                                        APIs
                                                        • __cftoe.LIBCMT ref: 6E9488ED
                                                          • Part of subcall function 6E99A116: __mbstowcs_s_l.LIBCMT ref: 6E99A12C
                                                        • __cftoe.LIBCMT ref: 6E948911
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: __cftoe$__mbstowcs_s_l
                                                        • String ID: zX$P
                                                        • API String ID: 1494777130-2079734279
                                                        • Opcode ID: b2a312c2bda7992f2e97662b462c8faac7001b79b437219bb22e34c5eccbf748
                                                        • Instruction ID: c73d08edde60737932bd843034374a8dba528d0ecbf27ca1e3748544c6c89d9e
                                                        • Opcode Fuzzy Hash: b2a312c2bda7992f2e97662b462c8faac7001b79b437219bb22e34c5eccbf748
                                                        • Instruction Fuzzy Hash: CD910EB11087819FC376CF55C890BABBBE8EF84714F504A1DE1A98B280EB719645CF92
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E968ABB
                                                        • __CxxThrowException@8.LIBCMT ref: 6E968B82
                                                        Strings
                                                        • PK_DefaultDecryptionFilter: ciphertext too long, xrefs: 6E968A8E
                                                        • : invalid ciphertext, xrefs: 6E968B48
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw
                                                        • String ID: : invalid ciphertext$PK_DefaultDecryptionFilter: ciphertext too long
                                                        • API String ID: 2005118841-483996327
                                                        • Opcode ID: 7c57808dd629b1bfd264b57e19a8c02694dc263926f3814c5518f14e7455dc85
                                                        • Instruction ID: 65e16dcb5ec176770ed4b1541f03bc327817c08f4b922d53ac7829edf965b6d9
                                                        • Opcode Fuzzy Hash: 7c57808dd629b1bfd264b57e19a8c02694dc263926f3814c5518f14e7455dc85
                                                        • Instruction Fuzzy Hash: B6511AB5104741AFD324CFA4C990EABB7E8AFD9704F004A1DA99A87650DB31E909CF62
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E966BA6
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E934067
                                                          • Part of subcall function 6E934010: _memmove.LIBCMT ref: 6E9340C8
                                                        • __CxxThrowException@8.LIBCMT ref: 6E966C56
                                                        Strings
                                                        • NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes, xrefs: 6E966B33
                                                        • RandomNumberGenerator: IncorporateEntropy not implemented, xrefs: 6E966BE3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                                        • String ID: NullRNG: NullRNG should only be passed to functions that don't need to generate random bytes$RandomNumberGenerator: IncorporateEntropy not implemented
                                                        • API String ID: 1902190269-184618050
                                                        • Opcode ID: f4e6e1af3d98f37d3a9ee0f6c91eed87d98867664db20c074f51c36b2035cefe
                                                        • Instruction ID: e5176f16216fd1c0af85f80e8d4ff0f95078d32907b18d802673ac30b7cf7bd7
                                                        • Opcode Fuzzy Hash: f4e6e1af3d98f37d3a9ee0f6c91eed87d98867664db20c074f51c36b2035cefe
                                                        • Instruction Fuzzy Hash: 5C5102B1108780AFC300DFA9C980A5BFBE8BF99654F504A2EF59587390E7B4D948CF52
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934EFC
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934F16
                                                        • _memmove.LIBCMT ref: 6E934F6C
                                                          • Part of subcall function 6E934D90: std::_Xinvalid_argument.LIBCPMT ref: 6E934DA9
                                                          • Part of subcall function 6E934D90: std::_Xinvalid_argument.LIBCPMT ref: 6E934DCA
                                                          • Part of subcall function 6E934D90: std::_Xinvalid_argument.LIBCPMT ref: 6E934DE5
                                                          • Part of subcall function 6E934D90: _memmove.LIBCMT ref: 6E934E4D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                        • String ID: string too long
                                                        • API String ID: 2168136238-2556327735
                                                        • Opcode ID: 18d69c449d20a6d7a0704885ec75843bc8cc64e4c05bcd51fbfd52b0ee67208b
                                                        • Instruction ID: 0f11719c712727485e22b084118e2d6597b414429cff14e086ba328887d05b4e
                                                        • Opcode Fuzzy Hash: 18d69c449d20a6d7a0704885ec75843bc8cc64e4c05bcd51fbfd52b0ee67208b
                                                        • Instruction Fuzzy Hash: 5231F9363106214FE7249DDCE85096EF7EAEFD1621735492FE455CB640C772D8828FA1
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E93211F
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E934067
                                                          • Part of subcall function 6E934010: _memmove.LIBCMT ref: 6E9340C8
                                                        • __CxxThrowException@8.LIBCMT ref: 6E9321BF
                                                        Strings
                                                        • PK_MessageAccumulator: DigestSize() should not be called, xrefs: 6E9320BD
                                                        • PK_MessageAccumulator: TruncatedFinal() should not be called, xrefs: 6E93215D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                                        • String ID: PK_MessageAccumulator: DigestSize() should not be called$PK_MessageAccumulator: TruncatedFinal() should not be called
                                                        • API String ID: 1902190269-1268710280
                                                        • Opcode ID: ff1ba1afb2868249520b1774a5d10f804952206871f731291a1928e2a6876166
                                                        • Instruction ID: 0f1f280724d2eb669c39934164712f5d302e1b824ad5a19c1bf15ab542930c6c
                                                        • Opcode Fuzzy Hash: ff1ba1afb2868249520b1774a5d10f804952206871f731291a1928e2a6876166
                                                        • Instruction Fuzzy Hash: CB4129B0C04288AFDB05DFE9D880ADEFBB8AF19314F104669E521A7391DB749A08DF50
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E931DC9
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E934067
                                                          • Part of subcall function 6E934010: _memmove.LIBCMT ref: 6E9340C8
                                                        • __CxxThrowException@8.LIBCMT ref: 6E931E74
                                                        Strings
                                                        • BufferedTransformation: this object is not attachable, xrefs: 6E931D67
                                                        • CryptoMaterial: this object contains invalid values, xrefs: 6E931E16
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8ThrowXinvalid_argumentstd::_$ExceptionRaise_memmove
                                                        • String ID: BufferedTransformation: this object is not attachable$CryptoMaterial: this object contains invalid values
                                                        • API String ID: 1902190269-3853263434
                                                        • Opcode ID: ef4943b711c4a276e5eb0a1d8407da65b4f850646105138da2739e641a45225f
                                                        • Instruction ID: 65d74fa0114f14ec9f8cd799f87e65c7ef4a7e264907de6748c0e3e15d485ddb
                                                        • Opcode Fuzzy Hash: ef4943b711c4a276e5eb0a1d8407da65b4f850646105138da2739e641a45225f
                                                        • Instruction Fuzzy Hash: E3414E71C04298AFDB04DFE9D880ADEFBB8EF59314F10866AE42567390DB749608CF50
                                                        APIs
                                                          • Part of subcall function 6E98D820: _memmove.LIBCMT ref: 6E98D930
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E96761A
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ExceptionException@8RaiseThrowXinvalid_argument_memmovestd::_
                                                        • String ID: byte digest to $ bytes$HashTransformation: can't truncate a
                                                        • API String ID: 39012651-1139078987
                                                        • Opcode ID: 1b2ea0e3eb4c102a5ee5a4167daf950ff04dd5ab12a2bafe45596d7d513ec44f
                                                        • Instruction ID: 5b13505e3dd325c78ef2da31d3e08ec853ecba9f1c638031c402ff44a4c493a4
                                                        • Opcode Fuzzy Hash: 1b2ea0e3eb4c102a5ee5a4167daf950ff04dd5ab12a2bafe45596d7d513ec44f
                                                        • Instruction Fuzzy Hash: 94414F711083D0AAD321CB94C844FDBB7E8AFD9314F144E1DE69997280EB7595098FA7
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E96BF2D
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                        • String ID: gfff$gfff$vector<T> too long
                                                        • API String ID: 1823113695-3369487235
                                                        • Opcode ID: b57cb95e2405690958a0f0050b1267bdac61e754ba0fdc285ddf123f6e1ef6a7
                                                        • Instruction ID: 7b9dcd1022e6d7da62bfd8803782087c71d90b16a25a5d318897af376284bdf1
                                                        • Opcode Fuzzy Hash: b57cb95e2405690958a0f0050b1267bdac61e754ba0fdc285ddf123f6e1ef6a7
                                                        • Instruction Fuzzy Hash: 3D31B6B1A006099FD718CF99D980E6AF7B9EF98310F14862DF9599B380E771B904CF91
                                                        APIs
                                                        • QueryPerformanceFrequency.KERNEL32(64F62E83,64F62E83), ref: 6E998E7F
                                                        • GetLastError.KERNEL32(0000000A), ref: 6E998E8F
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E998F14
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        • Timer: QueryPerformanceFrequency failed with error , xrefs: 6E998EA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ErrorExceptionException@8FrequencyLastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                                        • String ID: Timer: QueryPerformanceFrequency failed with error
                                                        • API String ID: 2175244869-348333943
                                                        • Opcode ID: 45ed47bd0fe44fc1086cc38564e3b376dc41b711a5c2a775dfdc8eb4b93aa682
                                                        • Instruction ID: 530ac8bc70a7ca3c05f0f4a8b464c652f143df256c3c9a6841199a06a30d16fd
                                                        • Opcode Fuzzy Hash: 45ed47bd0fe44fc1086cc38564e3b376dc41b711a5c2a775dfdc8eb4b93aa682
                                                        • Instruction Fuzzy Hash: 982128B15087809FD311CFA4C840B9BB7E8FF99614F404E1DF5A986281E775D4088FA2
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(64F62E83,64F62E83,?,00000000), ref: 6E998F7F
                                                        • GetLastError.KERNEL32(0000000A,?,00000000), ref: 6E998F8F
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E999014
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        • Timer: QueryPerformanceCounter failed with error , xrefs: 6E998FA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CounterErrorExceptionException@8LastPerformanceQueryRaiseThrowXinvalid_argumentstd::_
                                                        • String ID: Timer: QueryPerformanceCounter failed with error
                                                        • API String ID: 1823523280-4075696077
                                                        • Opcode ID: 6159cb3923fe2aeeb1bff5a95406186765561e9d84ad2d512f67afd55319b64b
                                                        • Instruction ID: 962bbf574c6c7c65771f976aad73c9b78bf954b7633e55c2d556cf34bcd38c83
                                                        • Opcode Fuzzy Hash: 6159cb3923fe2aeeb1bff5a95406186765561e9d84ad2d512f67afd55319b64b
                                                        • Instruction Fuzzy Hash: C2212BB15087809FD311CFA4C840B9BB7E8FF99618F404E1DF5A986281E775D4048F92
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E966518
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • __CxxThrowException@8.LIBCMT ref: 6E966558
                                                        Strings
                                                        • Cryptographic algorithms are disabled after a power-up self test failed., xrefs: 6E966527
                                                        • Cryptographic algorithms are disabled before the power-up self tests are performed., xrefs: 6E9664E7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: Cryptographic algorithms are disabled after a power-up self test failed.$Cryptographic algorithms are disabled before the power-up self tests are performed.
                                                        • API String ID: 3476068407-3345525433
                                                        • Opcode ID: 00b461586a1b66f8a9298c828f1b7877b42c67db10ac46f3de4eb469ffa52ac4
                                                        • Instruction ID: a8c51aa706f58c4aa116f60c936d3db754d1d0f82ca9bb5ae044fc66a472aa55
                                                        • Opcode Fuzzy Hash: 00b461586a1b66f8a9298c828f1b7877b42c67db10ac46f3de4eb469ffa52ac4
                                                        • Instruction Fuzzy Hash: DE21CF715282909ED720DFE4C841BDBB3ECAFD6648F404E1EA58986285EB74D004CEA3
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E96C14E
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                        • String ID: gfff$gfff$vector<T> too long
                                                        • API String ID: 1823113695-3369487235
                                                        • Opcode ID: ad664f68b0a772af5fd49d3f129ffee4ef1e77faa9ace3135fb4793f85c90c05
                                                        • Instruction ID: 650527deb95576d5e215526a660c27019a17ae27b42455aa603dd6c51f433b9a
                                                        • Opcode Fuzzy Hash: ad664f68b0a772af5fd49d3f129ffee4ef1e77faa9ace3135fb4793f85c90c05
                                                        • Instruction Fuzzy Hash: B101D1B3F141251F931199BFED4444AEBABAED439471ACA3BE608DF348E571D8025BC2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Exception@8Throw
                                                        • String ID:
                                                        • API String ID: 2655171816-0
                                                        • Opcode ID: 9c1f587eb167cf4b6be4cad2320b5100fd715d517349ef7138deaee6b6d5166c
                                                        • Instruction ID: 637be2d2517554148cda8873470ccda8f05972f0ab2d626b08119d5c38823244
                                                        • Opcode Fuzzy Hash: 9c1f587eb167cf4b6be4cad2320b5100fd715d517349ef7138deaee6b6d5166c
                                                        • Instruction Fuzzy Hash: 885193B57187468FDB14DFA9C990A2FB3E9AFC8604F10492EE455C7340EB34E9098F92
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E94D5E4
                                                        • __CxxThrowException@8.LIBCMT ref: 6E94D5F9
                                                        • std::exception::exception.LIBCMT ref: 6E94D608
                                                        • __CxxThrowException@8.LIBCMT ref: 6E94D61D
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                                                        • String ID:
                                                        • API String ID: 2621100827-0
                                                        • Opcode ID: a6f424f5209f5cd2a3ada8e12047d17d48d5b7ba93c78c5ede3297b5f556ed76
                                                        • Instruction ID: f519620f07bafbc1546cb5702dc2b534ba6d942886db95bdcfe9b71f593a710d
                                                        • Opcode Fuzzy Hash: a6f424f5209f5cd2a3ada8e12047d17d48d5b7ba93c78c5ede3297b5f556ed76
                                                        • Instruction Fuzzy Hash: 055159B1A0064AEFD744CFA8C980A8ABBF4FF49304F54866AE4199B740D771E954CFA1
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E956035
                                                        • __CxxThrowException@8.LIBCMT ref: 6E95604A
                                                        • std::exception::exception.LIBCMT ref: 6E956059
                                                        • __CxxThrowException@8.LIBCMT ref: 6E95606E
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                                                        • String ID:
                                                        • API String ID: 2621100827-0
                                                        • Opcode ID: 1398cb9b9a7a21c880b76f6b1236fc4fe262e20bda2858bc593e45186af3f641
                                                        • Instruction ID: d35d1876e99a776fd15318e04b894a09f2ece487a16e36c518d00a021c0216ba
                                                        • Opcode Fuzzy Hash: 1398cb9b9a7a21c880b76f6b1236fc4fe262e20bda2858bc593e45186af3f641
                                                        • Instruction Fuzzy Hash: 11513AB1A0060AEFC744CFA8C980A8ABBF4FF49304F148669D519D7B41D771E954CFA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$Init
                                                        • String ID:
                                                        • API String ID: 3740757921-0
                                                        • Opcode ID: c4c78aae7e90e0299213975296990a2d33411418771983920ec3bf6a5c3c65b0
                                                        • Instruction ID: 47c4141eb6f33a8791885e403cf12b54e8d88f24515bb23528607a3dc0e17d36
                                                        • Opcode Fuzzy Hash: c4c78aae7e90e0299213975296990a2d33411418771983920ec3bf6a5c3c65b0
                                                        • Instruction Fuzzy Hash: 77416776608602DFD700DF69C940A5BB7E8EF9A724F044A6AF9449B350E731E905CFA2
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E955E87
                                                        • __CxxThrowException@8.LIBCMT ref: 6E955E9C
                                                        • std::exception::exception.LIBCMT ref: 6E955EAB
                                                        • __CxxThrowException@8.LIBCMT ref: 6E955EC0
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                                                        • String ID:
                                                        • API String ID: 2621100827-0
                                                        • Opcode ID: d522205375760a47e4399cc40390f2539ae4765e0a5a3bdbca829ec490826665
                                                        • Instruction ID: e1e8739baf2d5b65a6514f89a36a2df9e4c545bf71ccaad91ab054b9d31a6da5
                                                        • Opcode Fuzzy Hash: d522205375760a47e4399cc40390f2539ae4765e0a5a3bdbca829ec490826665
                                                        • Instruction Fuzzy Hash: 414128B19007489FC720CFA9C980A9ABBF8FF19304F44896ED95A97741E775E508CFA1
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E94D437
                                                        • __CxxThrowException@8.LIBCMT ref: 6E94D44C
                                                        • std::exception::exception.LIBCMT ref: 6E94D45B
                                                        • __CxxThrowException@8.LIBCMT ref: 6E94D470
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8Throw$_malloc
                                                        • String ID:
                                                        • API String ID: 2621100827-0
                                                        • Opcode ID: d7657054c40eb1035078c591e2ecc4645abab00fb3a693667f8fc7ee19e699cc
                                                        • Instruction ID: ce0f484a8ca6671cb33222bde0f557e1e11ec13652446d8dfd5e9af0281028e1
                                                        • Opcode Fuzzy Hash: d7657054c40eb1035078c591e2ecc4645abab00fb3a693667f8fc7ee19e699cc
                                                        • Instruction Fuzzy Hash: F84128B19007489FC724CFA9D880A8ABBF8FF19304F44896ED95A97741E775E504CFA2
                                                        APIs
                                                          • Part of subcall function 6E966480: __CxxThrowException@8.LIBCMT ref: 6E966518
                                                          • Part of subcall function 6E966480: __CxxThrowException@8.LIBCMT ref: 6E966558
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E992C9A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E992CB1
                                                        • std::exception::exception.LIBCMT ref: 6E992CC3
                                                        • __CxxThrowException@8.LIBCMT ref: 6E992CDA
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C04
                                                          • Part of subcall function 6E999BB5: std::exception::exception.LIBCMT ref: 6E999C1E
                                                          • Part of subcall function 6E999BB5: __CxxThrowException@8.LIBCMT ref: 6E999C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$std::exception::exception$_malloc
                                                        • String ID:
                                                        • API String ID: 3942750879-0
                                                        • Opcode ID: dcb12b21674db7e153454edae518638daba7305746e5576b999ea833f150ab9d
                                                        • Instruction ID: 289e6952ef4759df0cadf865ee39ed5988c40891d9698f5cfea0ae0cbbf9a7d0
                                                        • Opcode Fuzzy Hash: dcb12b21674db7e153454edae518638daba7305746e5576b999ea833f150ab9d
                                                        • Instruction Fuzzy Hash: 734147B15187019FC314CF98C480A4AFBF8FFA9714F548A2EE19A87680D7B0E504CFA2
                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 6E95C478
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 6E95C488
                                                        • SafeArrayGetElement.OLEAUT32(?,00000001,?), ref: 6E95C4B4
                                                        • SafeArrayDestroy.OLEAUT32(?), ref: 6E95C512
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Bound$DestroyElement
                                                        • String ID:
                                                        • API String ID: 3987547017-0
                                                        • Opcode ID: c21111542a3b870f5bb2cf1edd185126d6e88907aa62de395aaee850d2c58281
                                                        • Instruction ID: 2ab150bf5021d590f09cf0a8c6838f547194c3650d567cbaccf20d3b491e011f
                                                        • Opcode Fuzzy Hash: c21111542a3b870f5bb2cf1edd185126d6e88907aa62de395aaee850d2c58281
                                                        • Instruction Fuzzy Hash: CA41F875A0414AAFDB00DFD8C884DAEB7B8EF59350F108569F919EB340D630EA56CFA0
                                                        APIs
                                                        • VariantInit.OLEAUT32(6E9B02A0), ref: 6E95B5D5
                                                        • VariantInit.OLEAUT32(?), ref: 6E95B5E2
                                                        • VariantClear.OLEAUT32(?), ref: 6E95B685
                                                        • VariantClear.OLEAUT32(6E9B02A0), ref: 6E95B68B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID:
                                                        • API String ID: 2610073882-0
                                                        • Opcode ID: 46c123df5846d4e6d5052f0465cf33e21d6c3f3702f72866179dd98eab7faaac
                                                        • Instruction ID: 281b2c17a198f59a87d81200555a49f7b43bf5e671a00d9f37bfbff5e72edeb9
                                                        • Opcode Fuzzy Hash: 46c123df5846d4e6d5052f0465cf33e21d6c3f3702f72866179dd98eab7faaac
                                                        • Instruction Fuzzy Hash: BE418072A05609DFDB04DFA9C980B9AF7F9EF89310F20419AE9049B354E735E942CF90
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6E9A88FD
                                                        • __isleadbyte_l.LIBCMT ref: 6E9A8930
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?), ref: 6E9A8961
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?), ref: 6E9A89CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: 22a92380999e94417724c28e4945f25c51e0eaaa7f3411148c8729ad4f781cd0
                                                        • Instruction ID: c5c4fab0c460ab6f17fbb5c28e5268b09c284c6e51e392f201c2cb9df03d87e0
                                                        • Opcode Fuzzy Hash: 22a92380999e94417724c28e4945f25c51e0eaaa7f3411148c8729ad4f781cd0
                                                        • Instruction Fuzzy Hash: 7831BF71A14286EFDB68DFECC8989AE3BB8BF41310F144969E2A49B190E730D940DF51
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E935ACB
                                                        • __CxxThrowException@8.LIBCMT ref: 6E935AE0
                                                        • std::exception::exception.LIBCMT ref: 6E935B18
                                                        • __CxxThrowException@8.LIBCMT ref: 6E935B2D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throwstd::exception::exception$_malloc
                                                        • String ID:
                                                        • API String ID: 3153320871-0
                                                        • Opcode ID: 2fbb02960a68b76d51e27ad86d6b315693e405ef1f4be3ba3c4d425ba883e3ba
                                                        • Instruction ID: a097b88a2c060cd6cad2f49676b332ce7a665735fcedd8a160a4101fe9ced69c
                                                        • Opcode Fuzzy Hash: 2fbb02960a68b76d51e27ad86d6b315693e405ef1f4be3ba3c4d425ba883e3ba
                                                        • Instruction Fuzzy Hash: AD3181B1910608AFCB04DFD8D8419DAB7F8FF98750F10866AE81997740EB70EA04CFA1
                                                        APIs
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • InitializeCriticalSection.KERNEL32(00000000,00000000,6E945D89,00000000,00000004,00000000,?,00000000,00000000), ref: 6E9484EA
                                                        • InitializeCriticalSection.KERNEL32(00000018,?,00000000,00000000), ref: 6E9484F0
                                                        • std::exception::exception.LIBCMT ref: 6E94853C
                                                        • __CxxThrowException@8.LIBCMT ref: 6E948551
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalInitializeSection$Exception@8Throw_mallocstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3005353045-0
                                                        • Opcode ID: 43ca47ad213f6e7e56803889d43e83b6b9085bccd5bcae4d24b817c998a9e0c1
                                                        • Instruction ID: 19e505d4518ff3429e7fbd0e92696b77a5ad9c2188e0d56fabe08586f9b6f58e
                                                        • Opcode Fuzzy Hash: 43ca47ad213f6e7e56803889d43e83b6b9085bccd5bcae4d24b817c998a9e0c1
                                                        • Instruction Fuzzy Hash: 61316A71901705AFC714CFA9C480A9AFBF8FF59210F508A6EE90687B40D770EA44CF91
                                                        APIs
                                                        • std::exception::exception.LIBCMT ref: 6E95DCC5
                                                          • Part of subcall function 6E999533: std::exception::_Copy_str.LIBCMT ref: 6E99954E
                                                        • __CxxThrowException@8.LIBCMT ref: 6E95DCDA
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                        • std::exception::exception.LIBCMT ref: 6E95DD09
                                                        • __CxxThrowException@8.LIBCMT ref: 6E95DD1E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throwstd::exception::exception$Copy_strExceptionRaise_mallocstd::exception::_
                                                        • String ID:
                                                        • API String ID: 399550787-0
                                                        • Opcode ID: 7fe0ad64d4b76d71d70c38a9e7c78c613730231e0de1b24136d8e4c35559b03a
                                                        • Instruction ID: 368bd1a79c685154856055c6e7cdc6c5dfc4b3aabf2cec86731ee709d6b1946b
                                                        • Opcode Fuzzy Hash: 7fe0ad64d4b76d71d70c38a9e7c78c613730231e0de1b24136d8e4c35559b03a
                                                        • Instruction Fuzzy Hash: 70315CB59003099FD704DFD9D840A9EBBF8BF95700F048569E9199B350E770EA04DFA1
                                                        APIs
                                                        • _malloc.LIBCMT ref: 6E9A2653
                                                          • Part of subcall function 6E999D66: __FF_MSGBANNER.LIBCMT ref: 6E999D7F
                                                          • Part of subcall function 6E999D66: __NMSG_WRITE.LIBCMT ref: 6E999D86
                                                          • Part of subcall function 6E999D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6E999BD4,6E931290,64F62E83), ref: 6E999DAB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_malloc
                                                        • String ID:
                                                        • API String ID: 501242067-0
                                                        • Opcode ID: 24112ee6d7d6358dd7d45dae2bf9f79648c943e8764319175fec29203a964d3e
                                                        • Instruction ID: c164b04a0d00ea859ba6b71f3bdcb51a3ef74e254a3448bfe4e26419752bc4f8
                                                        • Opcode Fuzzy Hash: 24112ee6d7d6358dd7d45dae2bf9f79648c943e8764319175fec29203a964d3e
                                                        • Instruction Fuzzy Hash: AE11CA72846A156FCB111FFFAC0469E37ADAF923A5B180827FA489B650DB34C8409F94
                                                        APIs
                                                          • Part of subcall function 6E964410: _malloc.LIBCMT ref: 6E96446E
                                                        • SafeArrayCreateVector.OLEAUT32(00000011,00000000,?), ref: 6E947287
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 6E94729B
                                                        • _memmove.LIBCMT ref: 6E9472AF
                                                        • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 6E9472B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$AccessCreateUnaccessVector_malloc_memmove
                                                        • String ID:
                                                        • API String ID: 583974297-0
                                                        • Opcode ID: 3f9955cf3684e8ffc2c1025fcd5537e5e7552debff624631b2002f4001e0b738
                                                        • Instruction ID: 3f362ae73a6f1913ca9f734ab497bf93d421782cbdd743565c204ae039557d88
                                                        • Opcode Fuzzy Hash: 3f9955cf3684e8ffc2c1025fcd5537e5e7552debff624631b2002f4001e0b738
                                                        • Instruction Fuzzy Hash: 2E1163B2914529BBDB04CFD5D880DDFBB7DDFD9654B008269F90497240E670DA058FE0
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 6E955AB9
                                                        • VariantCopy.OLEAUT32(?,6E9C9C90), ref: 6E955AC1
                                                        • VariantClear.OLEAUT32(?), ref: 6E955AE2
                                                        • __CxxThrowException@8.LIBCMT ref: 6E955AEF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopyException@8InitThrow
                                                        • String ID:
                                                        • API String ID: 3826472263-0
                                                        • Opcode ID: f3a4af1aef4209275ad8d565187558191d7f4fabc6d10394882bac0ae00067d8
                                                        • Instruction ID: 474306e38819f801166184e588248940609c2565b89256ab530b4384ef0bdb68
                                                        • Opcode Fuzzy Hash: f3a4af1aef4209275ad8d565187558191d7f4fabc6d10394882bac0ae00067d8
                                                        • Instruction Fuzzy Hash: 3E117C72904669BBCB00DFD8888499FBB6CEF56614F11456AE924A7301D774AA048BA1
                                                        APIs
                                                        • _malloc.LIBCMT ref: 6E968D8A
                                                          • Part of subcall function 6E999D66: __FF_MSGBANNER.LIBCMT ref: 6E999D7F
                                                          • Part of subcall function 6E999D66: __NMSG_WRITE.LIBCMT ref: 6E999D86
                                                          • Part of subcall function 6E999D66: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,00000000,?,6E999BD4,6E931290,64F62E83), ref: 6E999DAB
                                                          • Part of subcall function 6E9991F6: std::_Lockit::_Lockit.LIBCPMT ref: 6E999202
                                                        • _malloc.LIBCMT ref: 6E968DAF
                                                        • std::exception::exception.LIBCMT ref: 6E968DD4
                                                        • __CxxThrowException@8.LIBCMT ref: 6E968DEB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _malloc$AllocateException@8HeapLockitLockit::_Throwstd::_std::exception::exception
                                                        • String ID:
                                                        • API String ID: 3043633502-0
                                                        • Opcode ID: 2bb3599944d4f1e0c11003bee9ede0d7c6ba747441b2ef912702407213dcd13a
                                                        • Instruction ID: 853e2162385cfab7e9987624b2bdd53ddb034d7b29788e845e746190d2b5447b
                                                        • Opcode Fuzzy Hash: 2bb3599944d4f1e0c11003bee9ede0d7c6ba747441b2ef912702407213dcd13a
                                                        • Instruction Fuzzy Hash: BBF0C2724043115BD221EBD59CA1BDF32AC9EE2614F480C19F95492240F721D1099DB3
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                        • Instruction ID: 11deb44cdfc202b88007331b31083cfb285e808d2c5b582a55e83ca63213af75
                                                        • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                                                        • Instruction Fuzzy Hash: 4D11693200014ABBCF124EC8DC158EE3F2ABF59354B498914FE2859070E336CAB1AF81
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _memmove_memset
                                                        • String ID: EncodingParameters
                                                        • API String ID: 3555123492-55378216
                                                        • Opcode ID: 1a38397f8ae4d240191d3f17d7e4db425a4e507fc7eda09a0f931170017a3325
                                                        • Instruction ID: e02e6ee14fb8f322c38720cd83eeea35f1b6b5ffb9774b6a28df83402d019230
                                                        • Opcode Fuzzy Hash: 1a38397f8ae4d240191d3f17d7e4db425a4e507fc7eda09a0f931170017a3325
                                                        • Instruction Fuzzy Hash: 176101B4208341AFD304CF69C880A2AFBE9AFD9754F144A1DF58987391D7B0E945CBA2
                                                        APIs
                                                          • Part of subcall function 6E934760: __CxxThrowException@8.LIBCMT ref: 6E9347F9
                                                          • Part of subcall function 6E968D80: _malloc.LIBCMT ref: 6E968D8A
                                                          • Part of subcall function 6E968D80: _malloc.LIBCMT ref: 6E968DAF
                                                        • _memcpy_s.LIBCMT ref: 6E93F282
                                                        • _memset.LIBCMT ref: 6E93F293
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: _malloc$Exception@8Throw_memcpy_s_memset
                                                        • String ID: @
                                                        • API String ID: 3081897325-2766056989
                                                        • Opcode ID: d8af072a2c5edd5d2f37e8e0da5fdde2571749d8fc88381c553866e3cbef407e
                                                        • Instruction ID: 3249d40fce4698533f3b3387373f6971587ef02c0260dd4b27c9890a1eaa4326
                                                        • Opcode Fuzzy Hash: d8af072a2c5edd5d2f37e8e0da5fdde2571749d8fc88381c553866e3cbef407e
                                                        • Instruction Fuzzy Hash: C2518CB0900358DFDB20CFE4C840BDEBBB8AF55308F148599D95967381DB71AA49CFA2
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934175
                                                        • _memmove.LIBCMT ref: 6E9341C6
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$_memmove
                                                        • String ID: string too long
                                                        • API String ID: 2168136238-2556327735
                                                        • Opcode ID: 881bde4be74c3b5aa9aa9bfa7c58e2067e229cd8e6cd3fdbd730c7748f31825e
                                                        • Instruction ID: c0d074506f688f43e3c85ff5bfdea0d685535646d56b903bccfc95f0407caa8b
                                                        • Opcode Fuzzy Hash: 881bde4be74c3b5aa9aa9bfa7c58e2067e229cd8e6cd3fdbd730c7748f31825e
                                                        • Instruction Fuzzy Hash: FE31A836310A215BE7208EDCAC8096AF7EDEFB5664731091BE491CBA41C762DC418FA1
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E96C39B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw
                                                        • String ID: gfff$gfff
                                                        • API String ID: 2005118841-3084402119
                                                        • Opcode ID: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                                        • Instruction ID: 8635c8a6531bfd536a5545db4fde1f9ff90a25ac916a94e33275b7e2543ba5c6
                                                        • Opcode Fuzzy Hash: 0fc975951894ecdd0a9fd187ee17f5a7dd85dbf523fbdf3c3300f41ba2466e2d
                                                        • Instruction Fuzzy Hash: 56313E71900209AFDB14CF98D980EEEB779EF94314F44851DF9159B284E730BA15CBA1
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E93194F
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • std::exception::exception.LIBCMT ref: 6E93198E
                                                          • Part of subcall function 6E9995C1: std::exception::operator=.LIBCMT ref: 6E9995DA
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E934067
                                                          • Part of subcall function 6E934010: _memmove.LIBCMT ref: 6E9340C8
                                                        Strings
                                                        • Clone() is not implemented yet., xrefs: 6E9318ED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                                        • String ID: Clone() is not implemented yet.
                                                        • API String ID: 2192554526-226299721
                                                        • Opcode ID: be6a1a30a3e9a0c4866ad9c4e534fcd6c2975635c5cf2f85e85c00e4886c1105
                                                        • Instruction ID: 7b4089dbec5afa94e2763d40cae175796fc62ab2be1a693a98a0440d9e40cc2c
                                                        • Opcode Fuzzy Hash: be6a1a30a3e9a0c4866ad9c4e534fcd6c2975635c5cf2f85e85c00e4886c1105
                                                        • Instruction Fuzzy Hash: 6E316BB1804248AFCB14CFD9D840AEEFBB8EF59714F104A2EE821A7781E7759905DF90
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E965657
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        • StringStore: missing InputBuffer argument, xrefs: 6E9655E0
                                                        • InputBuffer, xrefs: 6E9655BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                                        • String ID: InputBuffer$StringStore: missing InputBuffer argument
                                                        • API String ID: 3718517217-2380213735
                                                        • Opcode ID: 292dce9bfe1a7068ced5ffc76654c86709a111461c0c6b775e47fe79841fbc63
                                                        • Instruction ID: 67e6bac8c74a45c98afd222b13e03e3a7a66635c8e6b3f016a0c34be1bf8e1c8
                                                        • Opcode Fuzzy Hash: 292dce9bfe1a7068ced5ffc76654c86709a111461c0c6b775e47fe79841fbc63
                                                        • Instruction Fuzzy Hash: E04124B15087809FD310CF99C490A9BBBE4BF99614F544A2EE59987380DB70D908CF52
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E931F36
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • std::exception::exception.LIBCMT ref: 6E931F6E
                                                          • Part of subcall function 6E9995C1: std::exception::operator=.LIBCMT ref: 6E9995DA
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E934067
                                                          • Part of subcall function 6E934010: _memmove.LIBCMT ref: 6E9340C8
                                                        Strings
                                                        • CryptoMaterial: this object does not support precomputation, xrefs: 6E931ED4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_$ExceptionException@8RaiseThrow_memmovestd::exception::exceptionstd::exception::operator=
                                                        • String ID: CryptoMaterial: this object does not support precomputation
                                                        • API String ID: 2192554526-3625584042
                                                        • Opcode ID: 05769faf62e92e7f00724c337ad564a29678e153350582095ae4bc9a2a64a83c
                                                        • Instruction ID: 03ecfc36f978cce5642ddc8227d0878b6c7ea6e39c3f01bd41d5506ca3b05718
                                                        • Opcode Fuzzy Hash: 05769faf62e92e7f00724c337ad564a29678e153350582095ae4bc9a2a64a83c
                                                        • Instruction Fuzzy Hash: 49315DB1804248AFCB14CFD9D840AEEFBB8EF59714F20466EE521A7780D7759905DF90
                                                        APIs
                                                        • __CxxThrowException@8.LIBCMT ref: 6E943327
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E94336B
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throwstd::exception::exception$ExceptionRaiseXinvalid_argumentstd::_
                                                        • String ID: vector<T> too long
                                                        • API String ID: 1735018483-3788999226
                                                        • Opcode ID: 2f98193efb1ef4f4f10b7f81b297fb3db8fde037e7ae2267db1d962f3721c83f
                                                        • Instruction ID: 01e31db20f1983ccf8de1b262f6575737e51cf63674fbfab21b5be2107f8fe94
                                                        • Opcode Fuzzy Hash: 2f98193efb1ef4f4f10b7f81b297fb3db8fde037e7ae2267db1d962f3721c83f
                                                        • Instruction Fuzzy Hash: C231E2B1A04616DFCB14CFE8D880A9AB7B4EF85714F404629EC159F380DB31E900CF91
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E95584D
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • VariantClear.OLEAUT32(00000000), ref: 6E955899
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$ClearException@8ThrowVariantXinvalid_argumentstd::_
                                                        • String ID: vector<T> too long
                                                        • API String ID: 2677079660-3788999226
                                                        • Opcode ID: 08c65163199d94173394b867fa3eb37116e01c103f45cf082e660750da68c71b
                                                        • Instruction ID: 890a2c82e3471db465db9930f0828c21d0f894e49e70560617210722b022d86e
                                                        • Opcode Fuzzy Hash: 08c65163199d94173394b867fa3eb37116e01c103f45cf082e660750da68c71b
                                                        • Instruction Fuzzy Hash: 3821A1B2A006059FD710CFA8D880AAEB7F9EF84324F144A2EE56597740E734E9408F91
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E94576B
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E945782
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw
                                                        • String ID: string too long
                                                        • API String ID: 963545896-2556327735
                                                        • Opcode ID: 505f0b4ba71b94faab3ac81fc27627b80a02b21aaacb521207409a0def4d3344
                                                        • Instruction ID: a2dedc5499d45032b173c591b51b46a6e9603ffd5a0b760288e7e10267751a76
                                                        • Opcode Fuzzy Hash: 505f0b4ba71b94faab3ac81fc27627b80a02b21aaacb521207409a0def4d3344
                                                        • Instruction Fuzzy Hash: 2911B433304611DFE3219ADCA890AAAF3EDBFA5624F20062FE552CB740C761D9048BA1
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E9346C4
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E93470B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                        • String ID: string too long
                                                        • API String ID: 1785806476-2556327735
                                                        • Opcode ID: 2759a8c041c963f6301a0524d4643dc2083206bde77b9204a4a23115d5c37e03
                                                        • Instruction ID: da8d5509ce74557bf37680f30b9c8b0421cb1f7c9b0fe6a625edc69d05f4d3b1
                                                        • Opcode Fuzzy Hash: 2759a8c041c963f6301a0524d4643dc2083206bde77b9204a4a23115d5c37e03
                                                        • Instruction Fuzzy Hash: F611E9761143215FF7209DF8A8C0A6FB7ACEF51218F310E2ED49783682D762E4498FA1
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E964E00
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        • OutputBuffer, xrefs: 6E964D77
                                                        • ArraySink: missing OutputBuffer argument, xrefs: 6E964D91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                                        • String ID: ArraySink: missing OutputBuffer argument$OutputBuffer
                                                        • API String ID: 3718517217-3781944848
                                                        • Opcode ID: 43b4626719d66aab6201f56e521e91bd5601554f0b3a3675602c0c12965b0800
                                                        • Instruction ID: d6d28b08d89542b13c9e706b6bbed26ca17dea7098dd3b006db3a16b635fb2db
                                                        • Opcode Fuzzy Hash: 43b4626719d66aab6201f56e521e91bd5601554f0b3a3675602c0c12965b0800
                                                        • Instruction Fuzzy Hash: AA3104B5508780AFC310CFA9C480A9BBBE4BF99654F404E2EF5A587350EB75D908CF92
                                                        APIs
                                                          • Part of subcall function 6E934010: std::_Xinvalid_argument.LIBCPMT ref: 6E93402A
                                                        • __CxxThrowException@8.LIBCMT ref: 6E940201
                                                          • Part of subcall function 6E99AC75: RaiseException.KERNEL32(?,?,6E999C34,64F62E83,?,?,?,?,6E999C34,64F62E83,6E9C9C90,6E9DB974,64F62E83), ref: 6E99ACB7
                                                        Strings
                                                        • StringSink: OutputStringPointer not specified, xrefs: 6E94019B
                                                        • OutputStringPointer, xrefs: 6E94018C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: ExceptionException@8RaiseThrowXinvalid_argumentstd::_
                                                        • String ID: OutputStringPointer$StringSink: OutputStringPointer not specified
                                                        • API String ID: 3718517217-1331214609
                                                        • Opcode ID: 14a6cd5d52bdc5be715fb10b8064eebd3b3b0b9f49b79881a51a764fab276e59
                                                        • Instruction ID: 227b3ec972e11b42c8b84c542025fa0d794f5db9b053d5f1f575fc43e0823d86
                                                        • Opcode Fuzzy Hash: 14a6cd5d52bdc5be715fb10b8064eebd3b3b0b9f49b79881a51a764fab276e59
                                                        • Instruction Fuzzy Hash: C7213075D04648AFCB04DFD9D890BDEFBB8EF59204F10855AE425AB381DB359504DF50
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E934636
                                                          • Part of subcall function 6E999125: std::exception::exception.LIBCMT ref: 6E99913A
                                                          • Part of subcall function 6E999125: __CxxThrowException@8.LIBCMT ref: 6E99914F
                                                          • Part of subcall function 6E999125: std::exception::exception.LIBCMT ref: 6E999160
                                                        • _memmove.LIBCMT ref: 6E93466F
                                                        Strings
                                                        • invalid string position, xrefs: 6E934631
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                        • String ID: invalid string position
                                                        • API String ID: 1785806476-1799206989
                                                        • Opcode ID: d9087f094487adbf136b3424fd246074bf1e6df2fc2a6f1333a1ee0d0214371f
                                                        • Instruction ID: f9e9d51f8cc060975e8328593bd8d6e2e420cb850371fc3be64891daf6ec8f71
                                                        • Opcode Fuzzy Hash: d9087f094487adbf136b3424fd246074bf1e6df2fc2a6f1333a1ee0d0214371f
                                                        • Instruction Fuzzy Hash: 5301C4313002618BD3218DECEC80A6AB3BAEFD1618B354D2DD195CB701D6B2EC428FA1
                                                        APIs
                                                        • type_info::operator!=.LIBCMT ref: 6E96ACF8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: type_info::operator!=
                                                        • String ID: Modulus$PublicExponent
                                                        • API String ID: 2241493438-3324115277
                                                        • Opcode ID: 84606f4dc49e98b0d2f09e71f756d7ab8ce03fae0d57fee02251bfc88ab567c6
                                                        • Instruction ID: 3860aba5142dd6d44ebe3b5726824c04c3e3c04c59ed38cea918dcb249157ce4
                                                        • Opcode Fuzzy Hash: 84606f4dc49e98b0d2f09e71f756d7ab8ce03fae0d57fee02251bfc88ab567c6
                                                        • Instruction Fuzzy Hash: E511E0309083149FC200DFA8C94059BFBF8AFE6648F404A2FF5819B260EB70D848CF96
                                                        APIs
                                                        • type_info::operator!=.LIBCMT ref: 6E98B848
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: type_info::operator!=
                                                        • String ID: Modulus$PublicExponent
                                                        • API String ID: 2241493438-3324115277
                                                        • Opcode ID: 6fb0c025cfd66a287ed41ca0269ad5252b480a463c2f3a83b3a61fa23be2b639
                                                        • Instruction ID: 025e09d22fb78193b913bc0c4eab00b10e8e890f127e38bd8755c1bf76c85de2
                                                        • Opcode Fuzzy Hash: 6fb0c025cfd66a287ed41ca0269ad5252b480a463c2f3a83b3a61fa23be2b639
                                                        • Instruction Fuzzy Hash: A8118F705043445EC600DFA9894058BFBF8AFE5648F140E6EF9855B360EB31D949CF96
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E96B605
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E96B634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                        • String ID: vector<T> too long
                                                        • API String ID: 1785806476-3788999226
                                                        • Opcode ID: bbd2d77ff409c802c9069adb3689000bbe45fc05ee6900086507fb2df3a0dc4e
                                                        • Instruction ID: 4090b89e6159bc91747474c55c5461a42563ff771952e82c2b22334a1b9cc632
                                                        • Opcode Fuzzy Hash: bbd2d77ff409c802c9069adb3689000bbe45fc05ee6900086507fb2df3a0dc4e
                                                        • Instruction Fuzzy Hash: A90171B26006059FE724DEE9DC958A7B3ECEF94254718492EE9AAC3254F670F8048F61
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E994241
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E994277
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                        • String ID: vector<bool> too long
                                                        • API String ID: 1785806476-842332957
                                                        • Opcode ID: dddcdbce88e89584ae86e7a7357bfc62013b58ba1cc2bc0ccf3cc80d86a0f42e
                                                        • Instruction ID: f13610f203b9cb6a07995685dd5a09b3a5138f33d7ad32dd08b83b386c3dee69
                                                        • Opcode Fuzzy Hash: dddcdbce88e89584ae86e7a7357bfc62013b58ba1cc2bc0ccf3cc80d86a0f42e
                                                        • Instruction Fuzzy Hash: 2E01DF72A042055FD714CFA9DCD08AEB3ADFFC4354F55462AE52687744E730E909CEA0
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E993855
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E993880
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                        • String ID: vector<T> too long
                                                        • API String ID: 1785806476-3788999226
                                                        • Opcode ID: 126deabb3ffe6f595f73946cc445296b441ebf078975d6485d906ad5a5dd372c
                                                        • Instruction ID: ef5aeb229b78921b3a7083cdb36065a0d689ab3d3c840dbd42e904b93d71354f
                                                        • Opcode Fuzzy Hash: 126deabb3ffe6f595f73946cc445296b441ebf078975d6485d906ad5a5dd372c
                                                        • Instruction Fuzzy Hash: 980171B15007099FD314DEF9D8898AAB3ECAF942107154A3DE5AAD3650EA74F8008F60
                                                        APIs
                                                        • std::_Xinvalid_argument.LIBCPMT ref: 6E945173
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E9990ED
                                                          • Part of subcall function 6E9990D8: __CxxThrowException@8.LIBCMT ref: 6E999102
                                                          • Part of subcall function 6E9990D8: std::exception::exception.LIBCMT ref: 6E999113
                                                        • _memmove.LIBCMT ref: 6E94519E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                                                        • String ID: vector<T> too long
                                                        • API String ID: 1785806476-3788999226
                                                        • Opcode ID: 87024923642c5152725c0557f7b644d48e661751c49ff39359387965a56f21e5
                                                        • Instruction ID: c8bf3e66bf0b01a913f3fa92341eef6d2c8122c860c7c0389cbbba4d4fd53866
                                                        • Opcode Fuzzy Hash: 87024923642c5152725c0557f7b644d48e661751c49ff39359387965a56f21e5
                                                        • Instruction Fuzzy Hash: 53014FF16002069FD728CEE8CC9186AB3EDEFA4254B18492DE85AC7740E775F904CF61
                                                        APIs
                                                          • Part of subcall function 6E99ABC3: __getptd.LIBCMT ref: 6E99ABC9
                                                          • Part of subcall function 6E99ABC3: __getptd.LIBCMT ref: 6E99ABD9
                                                        • __getptd.LIBCMT ref: 6E99BFC3
                                                          • Part of subcall function 6E99EAE6: __getptd_noexit.LIBCMT ref: 6E99EAE9
                                                          • Part of subcall function 6E99EAE6: __amsg_exit.LIBCMT ref: 6E99EAF6
                                                        • __getptd.LIBCMT ref: 6E99BFD1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: __getptd$__amsg_exit__getptd_noexit
                                                        • String ID: csm
                                                        • API String ID: 803148776-1018135373
                                                        • Opcode ID: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                                        • Instruction ID: 7080104af2777e97b989a46f37ef23f1428759709beb98750e4311aa9e116171
                                                        • Opcode Fuzzy Hash: 86966626eb4e0d809bdbd7093bece3461dc5396f3a0cf366651c66bb381db945
                                                        • Instruction Fuzzy Hash: AD0146B48013059EDF648FE1D850AADB3FDBF58215F68482EE0519E2A0DB75C580EF41
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: NameName::
                                                        • String ID: {flat}
                                                        • API String ID: 1333004437-2606204563
                                                        • Opcode ID: b1e7bf10d8486febc4f5c512a49d38ff884c1ebe448232e3441d84de49a4e13c
                                                        • Instruction ID: 697c0a5b93a86fe616f43cee36cdc4edd14d8592db1ab216fa93b40657cd202b
                                                        • Opcode Fuzzy Hash: b1e7bf10d8486febc4f5c512a49d38ff884c1ebe448232e3441d84de49a4e13c
                                                        • Instruction Fuzzy Hash: A5F03075144645AFCB00CFACC468BAC3BA59F92759F148045EA5C0F252C731D442CF55
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,64F62E83), ref: 6E9476AD
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,64F62E83), ref: 6E9476FF
                                                        • EnterCriticalSection.KERNEL32(64F62E83,?,?,?,64F62E83), ref: 6E94770D
                                                        • LeaveCriticalSection.KERNEL32(64F62E83,?,00000000,?,?,?,?,64F62E83), ref: 6E94772A
                                                          • Part of subcall function 6E999BB5: _malloc.LIBCMT ref: 6E999BCF
                                                          • Part of subcall function 6E946D40: _rand.LIBCMT ref: 6E946DEA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$_malloc_rand
                                                        • String ID:
                                                        • API String ID: 119520971-0
                                                        • Opcode ID: 7a8e260ec95eeb1d6d5b885fa9b3c562b0f9f0db216ab75ff732d012e02bebf3
                                                        • Instruction ID: ca7d6a50c28d70b449700018b28a0e8d0b0dfeb11284f2b63786b7190f287e79
                                                        • Opcode Fuzzy Hash: 7a8e260ec95eeb1d6d5b885fa9b3c562b0f9f0db216ab75ff732d012e02bebf3
                                                        • Instruction Fuzzy Hash: 212153B2904609EFCB10DF95CC44ADBB7BDFF91254F104A25E81697640EB70EA05CFA0
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?,?,?), ref: 6E9495A9
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 6E9495CA
                                                        • EnterCriticalSection.KERNEL32(00000000,?,?), ref: 6E9495DA
                                                        • LeaveCriticalSection.KERNEL32(00000000,?,?,?), ref: 6E9495FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1331992357.000000006E931000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E930000, based on PE: true
                                                        • Associated: 00000000.00000002.1331916618.000000006E930000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333243700.000000006E9B4000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333635993.000000006E9CE000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333724805.000000006E9D0000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333763815.000000006E9D1000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333799912.000000006E9D3000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DA000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333906761.000000006E9DC000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000000.00000002.1333971489.000000006E9DE000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_6e930000_LisectAVT_2403002A_482.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3168844106-0
                                                        • Opcode ID: af928f24894167adfb1a95d6e7ed151c72ca093d77a0523b15dbcf874979266e
                                                        • Instruction ID: fa07608b767f53a22cedada0924a3836b4505e8400a5b3a26e309f844086729f
                                                        • Opcode Fuzzy Hash: af928f24894167adfb1a95d6e7ed151c72ca093d77a0523b15dbcf874979266e
                                                        • Instruction Fuzzy Hash: F7116A7290450AEFCB40CFD9E9809DEF7BCFF91214B10459AE91597610E770EA51CFA0

                                                        Execution Graph

                                                        Execution Coverage:18.3%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:26
                                                        Total number of Limit Nodes:1
                                                        execution_graph 12399 1044800 12400 104481c 12399->12400 12405 1044893 12400->12405 12401 1044829 12410 104b573 12401->12410 12402 1044851 12406 10448b4 12405->12406 12415 104ae23 12406->12415 12419 104ae28 12406->12419 12407 1044908 12407->12401 12411 104b595 12410->12411 12423 104b677 12411->12423 12427 104b680 12411->12427 12412 104b59f 12412->12402 12416 104ae69 GetConsoleWindow 12415->12416 12418 104aeaa 12416->12418 12418->12407 12420 104ae69 GetConsoleWindow 12419->12420 12422 104aeaa 12420->12422 12422->12407 12425 104b6a7 12423->12425 12424 104b784 12424->12424 12425->12424 12431 104b294 12425->12431 12429 104b6a7 12427->12429 12428 104b784 12428->12428 12429->12428 12430 104b294 CreateActCtxA 12429->12430 12430->12428 12432 104c738 CreateActCtxA 12431->12432 12434 104c83e 12432->12434

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2937 104c72f-104c7ce 2939 104c7d5-104c83c CreateActCtxA 2937->2939 2941 104c845-104c8ca 2939->2941 2942 104c83e-104c844 2939->2942 2951 104c8f7-104c8ff 2941->2951 2952 104c8cc-104c8dc 2941->2952 2942->2941 2955 104c900 2951->2955 2956 104c8e3-104c8ef 2952->2956 2955->2955 2956->2951
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 0104C829
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1290203358.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1040000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 633d2acd2c01871502f767a6f72e855628496e34e65bf98a400dfb3e23afc8a8
                                                        • Instruction ID: 4f0c86fbe69c2163be0ac906d1027d56093d7817d3167691b9f4a505539303f6
                                                        • Opcode Fuzzy Hash: 633d2acd2c01871502f767a6f72e855628496e34e65bf98a400dfb3e23afc8a8
                                                        • Instruction Fuzzy Hash: 75510971D01619CFEB25CFA5C980BDEBBF5BF49300F1080AAD149AB251DA715A45CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2916 104b294-104c83c CreateActCtxA 2921 104c845-104c8ca 2916->2921 2922 104c83e-104c844 2916->2922 2931 104c8f7-104c8ff 2921->2931 2932 104c8cc-104c8ef 2921->2932 2922->2921 2935 104c900 2931->2935 2932->2931 2935->2935
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 0104C829
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1290203358.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1040000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 24492ca479e204649d282320889fb763c57dcec9d96918f0fef1590f02676b2f
                                                        • Instruction ID: d129e2e52d703a361514dfce3965fc96d006e0190f99d37183577c29b86dee22
                                                        • Opcode Fuzzy Hash: 24492ca479e204649d282320889fb763c57dcec9d96918f0fef1590f02676b2f
                                                        • Instruction Fuzzy Hash: 875106B1D016198FEB24CFA5C984BCEBBF5AF49300F1080AAD548AB250DB716A85CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2957 104ae23-104aea8 GetConsoleWindow 2960 104aeb1-104aef1 2957->2960 2961 104aeaa-104aeb0 2957->2961 2961->2960
                                                        APIs
                                                        • GetConsoleWindow.KERNELBASE ref: 0104AE98
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1290203358.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1040000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWindow
                                                        • String ID:
                                                        • API String ID: 2863861424-0
                                                        • Opcode ID: 3083b257c2e9a06793e35b56cf4c50984fa61b9e37288f1b71ec5773c1d591da
                                                        • Instruction ID: ddac1abbbfec21ac2ebc27eab49ef8f84f9420e32f756ef15abc42b78a89bc90
                                                        • Opcode Fuzzy Hash: 3083b257c2e9a06793e35b56cf4c50984fa61b9e37288f1b71ec5773c1d591da
                                                        • Instruction Fuzzy Hash: 4D21DDB4D012089FCB24CFA9D584ADEBBF0AF48320F24842AD419B7340C7356942CFA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2966 104ae28-104aea8 GetConsoleWindow 2969 104aeb1-104aef1 2966->2969 2970 104aeaa-104aeb0 2966->2970 2970->2969
                                                        APIs
                                                        • GetConsoleWindow.KERNELBASE ref: 0104AE98
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1290203358.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_1040000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWindow
                                                        • String ID:
                                                        • API String ID: 2863861424-0
                                                        • Opcode ID: 457996375e892b9194caef6a8eb118d08906cc2509f3b75430abf8aae31ed899
                                                        • Instruction ID: 440b14235066fba4871a24897d3669c02a6415c37259033883d25d3fa3fb77aa
                                                        • Opcode Fuzzy Hash: 457996375e892b9194caef6a8eb118d08906cc2509f3b75430abf8aae31ed899
                                                        • Instruction Fuzzy Hash: E621BDB4D012099FDB24DFA9D584ADEBBF5AB48320F24942AD419B7240C7356946CFA4
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289601505.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fcd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 311608a9c8f2d14fe7fdb1d408b70af1239efb19e2fcfca4a4b07ba93dd852c1
                                                        • Instruction ID: 0912ca04e1607517d09ef00f2ba3b70d11a3d9f430eb7cea5515d1889a4dd687
                                                        • Opcode Fuzzy Hash: 311608a9c8f2d14fe7fdb1d408b70af1239efb19e2fcfca4a4b07ba93dd852c1
                                                        • Instruction Fuzzy Hash: E821E272904201DFDB159F50DAC5F5ABB65EB88324F24C16DE8090B246C336D816EBA2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289601505.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fcd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 41ce1249c718eabba61f4a3098907e4efa5e1e822c51719fd5a88f8d6c5cea3c
                                                        • Instruction ID: c19c63b24abcac6ad99e4e08b6044f3ac68b31617d04ec7b04515cbe7d92b9de
                                                        • Opcode Fuzzy Hash: 41ce1249c718eabba61f4a3098907e4efa5e1e822c51719fd5a88f8d6c5cea3c
                                                        • Instruction Fuzzy Hash: 79210372904241DFDB18DF10DAC1F1ABB65FB94324F20C57DE9090B246C336E856EBA2
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289794080.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fdd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f1e7b9d19674be2b8bfe5ec57d9556f10f10c550a859267e70cca1bdfc21e2fa
                                                        • Instruction ID: 010a235c1b9f0b1260628bd5f2c0cbd385fd269ed46e4e3dd70163577cc90aea
                                                        • Opcode Fuzzy Hash: f1e7b9d19674be2b8bfe5ec57d9556f10f10c550a859267e70cca1bdfc21e2fa
                                                        • Instruction Fuzzy Hash: 1C21F575A04300DFDB14DF14D9C8B16BB66EBC4324F28C56ED84A4B38AC336D847DA62
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289794080.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fdd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d73109c7770b97b296186b66597f0fac91a6889b6fa366e559d390859270cab4
                                                        • Instruction ID: 9fae70db4126f5ee27d258854af02395be82c5397679da883bd21b01fa08095d
                                                        • Opcode Fuzzy Hash: d73109c7770b97b296186b66597f0fac91a6889b6fa366e559d390859270cab4
                                                        • Instruction Fuzzy Hash: 76210771A04304EFDB15DF10D9C0B25BB66FB84325F28C56ED8494B392C336D846DA61
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289794080.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fdd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0570819fc33786626430afa1e6da73efb1814f2735a184834c36bd645658ac19
                                                        • Instruction ID: 20580f597da649ed02fa78d24d306a7b67c29a993e7b95943ca4ce9c749637e2
                                                        • Opcode Fuzzy Hash: 0570819fc33786626430afa1e6da73efb1814f2735a184834c36bd645658ac19
                                                        • Instruction Fuzzy Hash: 142153755093808FC716CF24D594715BF72EB46324F29C5EBD8498B6A7C33A980ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289601505.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fcd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                                                        • Instruction ID: f825e49e455c4c945fd04af6af1db2a6daff44e797680f540fa9f05926694c58
                                                        • Opcode Fuzzy Hash: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                                                        • Instruction Fuzzy Hash: 28219076904240DFCB16CF50DAC4B5ABF72FB94324F24C1A9DC490B656C336D81ADB91
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289601505.0000000000FCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FCD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fcd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                        • Instruction ID: f00dfaf89d28a3ad81fbf62d0264dddb3127135f98c0e6a73f7f2d878c981243
                                                        • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                        • Instruction Fuzzy Hash: DB110376904280CFCB05CF10DAC1B1ABF72FB94324F24C5ADD9490B656C336E85ADBA1
                                                        Memory Dump Source
                                                        • Source File: 00000004.00000002.1289794080.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_4_2_fdd000_MSBuild.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                        • Instruction ID: 7d998a17e7549ea1f5995a8a5b5114c5fce8dba94bbe904afcf3e9ed52c0cb8b
                                                        • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                        • Instruction Fuzzy Hash: 0A118B75904280DFCB15DF14D9C4B15BBB2FB84324F28C6AED8494B796C33AD84ADB61